Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-47081 (GCVE-0-2024-47081)
Vulnerability from cvelistv5 – Published: 2025-06-09 17:57 – Updated: 2025-06-09 18:40- CWE-522 - Insufficiently Protected Credentials
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-06-09T18:04:45.705Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-47081",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T18:39:03.849116Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T18:40:40.996Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "requests",
"vendor": "psf",
"versions": [
{
"status": "affected",
"version": "\u003c 2.32.4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-522",
"description": "CWE-522: Insufficiently Protected Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T17:57:47.731Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"name": "https://github.com/psf/requests/pull/6965",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/psf/requests/pull/6965"
},
{
"name": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"name": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"tags": [
"x_refsource_MISC"
],
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"name": "https://seclists.org/fulldisclosure/2025/Jun/2",
"tags": [
"x_refsource_MISC"
],
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"source": {
"advisory": "GHSA-9hjg-9r4m-mvj7",
"discovery": "UNKNOWN"
},
"title": "Requests vulnerable to .netrc credentials leak via malicious URLs"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2024-47081",
"datePublished": "2025-06-09T17:57:47.731Z",
"dateReserved": "2024-09-17T17:42:37.030Z",
"dateUpdated": "2025-06-09T18:40:40.996Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-47081\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-06-09T18:15:24.983\",\"lastModified\":\"2025-06-12T16:06:47.857\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.\"},{\"lang\":\"es\",\"value\":\"Requests es una librer\u00eda HTTP. Debido a un problema de an\u00e1lisis de URL, las versiones de Requests anteriores a la 2.32.4 pueden filtrar credenciales .netrc a terceros para URL espec\u00edficas manipuladas con fines maliciosos. Los usuarios deben actualizar a la versi\u00f3n 2.32.4 para obtener una soluci\u00f3n. En versiones anteriores de Requests, el uso del archivo .netrc se puede desactivar con `trust_env=False` en la sesi\u00f3n de Requests.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-522\"}]}],\"references\":[{\"url\":\"https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/psf/requests/pull/6965\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://seclists.org/fulldisclosure/2025/Jun/2\",\"source\":\"security-advisories@github.com\"},{\"url\":\"http://seclists.org/fulldisclosure/2025/Jun/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/03/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/03/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/04/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/06/04/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"Requests vulnerable to .netrc credentials leak via malicious URLs\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-522\", \"lang\": \"en\", \"description\": \"CWE-522: Insufficiently Protected Credentials\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"REQUIRED\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7\"}, {\"name\": \"https://github.com/psf/requests/pull/6965\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/psf/requests/pull/6965\"}, {\"name\": \"https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef\"}, {\"name\": \"https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env\"}, {\"name\": \"https://seclists.org/fulldisclosure/2025/Jun/2\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://seclists.org/fulldisclosure/2025/Jun/2\"}], \"affected\": [{\"vendor\": \"psf\", \"product\": \"requests\", \"versions\": [{\"version\": \"\u003c 2.32.4\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-06-09T17:57:47.731Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.\"}], \"source\": {\"advisory\": \"GHSA-9hjg-9r4m-mvj7\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://seclists.org/fulldisclosure/2025/Jun/2\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/03/9\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/03/11\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/04/1\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2025/06/04/6\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-06-09T18:04:45.705Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-47081\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-09T18:39:03.849116Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-09T18:39:45.731Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2024-47081\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2024-09-17T17:42:37.030Z\", \"datePublished\": \"2025-06-09T17:57:47.731Z\", \"dateUpdated\": \"2025-06-09T18:40:40.996Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2025:15614
Vulnerability from csaf_redhat - Published: 2025-09-10 12:27 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15614",
"url": "https://access.redhat.com/errata/RHSA-2025:15614"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15614.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:02+00:00",
"generator": {
"date": "2026-03-10T16:03:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15614",
"initial_release_date": "2025-09-10T12:27:22+00:00",
"revision_history": [
{
"date": "2025-09-10T12:27:22+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-10T12:27:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::highavailability"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-112.el8_8.11.src",
"product": {
"name": "fence-agents-0:4.2.1-112.el8_8.11.src",
"product_id": "fence-agents-0:4.2.1-112.el8_8.11.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-112.el8_8.11?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"product_id": "fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-112.el8_8.11?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-112.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"product_id": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-112.el8_8.11?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-112.el8_8.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"product_id": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-112.el8_8.11?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-112.el8_8.11.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src"
},
"product_reference": "fence-agents-0:4.2.1-112.el8_8.11.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-112.el8_8.11.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src"
},
"product_reference": "fence-agents-0:4.2.1-112.el8_8.11.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-112.el8_8.11.src as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src"
},
"product_reference": "fence-agents-0:4.2.1-112.el8_8.11.src",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-112.el8_8.11.src as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src"
},
"product_reference": "fence-agents-0:4.2.1-112.el8_8.11.src",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-10T12:27:22+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15614"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"AppStream-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"AppStream-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"AppStream-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.E4S:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-0:4.2.1-112.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-all-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-aws-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-brocade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-common-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-compute-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-debugsource-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-drac5-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-emerson-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-eps-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-gce-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-hpblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ifmib-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ilo2-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipdu-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-lpar-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-mpath-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-openstack-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-redfish-0:4.2.1-112.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rhevm-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsa-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-rsb-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-sbd-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-scsi-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-virsh-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-112.el8_8.11.noarch",
"HighAvailability-8.8.0.Z.TUS:fence-agents-wti-0:4.2.1-112.el8_8.11.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15622
Vulnerability from csaf_redhat - Published: 2025-09-10 12:56 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15622",
"url": "https://access.redhat.com/errata/RHSA-2025:15622"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15622.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:11+00:00",
"generator": {
"date": "2026-03-10T16:03:11+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15622",
"initial_release_date": "2025-09-10T12:56:48+00:00",
"revision_history": [
{
"date": "2025-09-10T12:56:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-10T12:56:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:11+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::highavailability"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-65.el8_4.21?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-65.el8_4.21?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-65.el8_4.21?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"product_id": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-65.el8_4.21?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-65.el8_4.21.src",
"product": {
"name": "fence-agents-0:4.2.1-65.el8_4.21.src",
"product_id": "fence-agents-0:4.2.1-65.el8_4.21.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-65.el8_4.21?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.21.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.21.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.21.src as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.21.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.21.src as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.21.src",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-65.el8_4.21.src as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src"
},
"product_reference": "fence-agents-0:4.2.1-65.el8_4.21.src",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-10T12:56:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15622"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"AppStream-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.AUS:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-0:4.2.1-65.el8_4.21.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aliyun-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-all-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-amt-ws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-apc-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-aws-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-azure-arm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-bladecenter-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-brocade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-mds-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-cisco-ucs-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-common-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-compute-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-debugsource-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-drac5-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eaton-snmp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-emerson-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-eps-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-gce-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-heuristics-ping-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-hpblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ibmblade-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ifmib-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-moonshot-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-mp-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo-ssh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ilo2-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-intelmodular-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipdu-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-ipmilan-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kdump-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-kubevirt-debuginfo-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-lpar-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-mpath-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-redfish-0:4.2.1-65.el8_4.21.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rhevm-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsa-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-rsb-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-sbd-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-scsi-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-virsh-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-rest-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-vmware-soap-0:4.2.1-65.el8_4.21.noarch",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:fence-agents-wti-0:4.2.1-65.el8_4.21.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:14750
Vulnerability from csaf_redhat - Published: 2025-08-27 15:17 - Updated: 2026-03-10 16:02A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14750",
"url": "https://access.redhat.com/errata/RHSA-2025:14750"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14750.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:02:44+00:00",
"generator": {
"date": "2026-03-10T16:02:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:14750",
"initial_release_date": "2025-08-27T15:17:04+00:00",
"revision_history": [
{
"date": "2025-08-27T15:17:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-27T15:17:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:02:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-129.el8_10.14.src",
"product": {
"name": "fence-agents-0:4.2.1-129.el8_10.14.src",
"product_id": "fence-agents-0:4.2.1-129.el8_10.14.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-129.el8_10.14?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8_10.14?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8_10.14?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8_10.14?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8_10.14?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8_10.14?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8_10.14?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8_10.14?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8_10.14?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"product_id": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-129.el8_10.14?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm-debuginfo@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-129.el8_10.14?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"product_id": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-129.el8_10.14?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8_10.14?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8_10.14?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8_10.14?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8_10.14?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8_10.14?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8_10.14?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8_10.14?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8_10.14?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-129.el8_10.14?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"product_id": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-129.el8_10.14?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-129.el8_10.14.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src"
},
"product_reference": "fence-agents-0:4.2.1-129.el8_10.14.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-129.el8_10.14.src as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src"
},
"product_reference": "fence-agents-0:4.2.1-129.el8_10.14.src",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-129.el8_10.14.src as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src"
},
"product_reference": "fence-agents-0:4.2.1-129.el8_10.14.src",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-27T15:17:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14750"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"HighAvailability-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-0:4.2.1-129.el8_10.14.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-all-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-amt-ws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-apc-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-aws-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-azure-arm-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-bladecenter-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-brocade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-mds-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-cisco-ucs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-common-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-compute-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-debugsource-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-drac5-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eaton-snmp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-emerson-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-eps-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-gce-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-heuristics-ping-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-hpblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-powervs-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibm-vpc-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ibmblade-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ifmib-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-moonshot-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-mp-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo-ssh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ilo2-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-intelmodular-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipdu-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-ipmilan-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kdump-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-lpar-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-mpath-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-openstack-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-redfish-0:4.2.1-129.el8_10.14.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rhevm-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsa-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-rsb-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-sbd-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-scsi-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-virsh-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-rest-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-vmware-soap-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-wti-0:4.2.1-129.el8_10.14.noarch",
"ResilientStorage-8.10.0.Z.MAIN.EUS:fence-agents-zvm-0:4.2.1-129.el8_10.14.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15691
Vulnerability from csaf_redhat - Published: 2025-09-11 13:38 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-requests is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15691",
"url": "https://access.redhat.com/errata/RHSA-2025:15691"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15691.json"
}
],
"title": "Red Hat Security Advisory: python-requests security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:12+00:00",
"generator": {
"date": "2026-03-10T16:03:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15691",
"initial_release_date": "2025-09-11T13:38:00+00:00",
"revision_history": [
{
"date": "2025-09-11T13:38:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-11T13:38:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus_long_life:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.20.0-3.el8_4.src",
"product": {
"name": "python-requests-0:2.20.0-3.el8_4.src",
"product_id": "python-requests-0:2.20.0-3.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.20.0-3.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-requests-0:2.20.0-3.el8_4.noarch",
"product": {
"name": "python3-requests-0:2.20.0-3.el8_4.noarch",
"product_id": "python3-requests-0:2.20.0-3.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests@2.20.0-3.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python-requests-0:2.20.0-3.el8_4.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python3-requests-0:2.20.0-3.el8_4.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_4.src as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python-requests-0:2.20.0-3.el8_4.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-requests-0:2.20.0-3.el8_4.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.Z.AUS:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.AUS:python3-requests-0:2.20.0-3.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-requests-0:2.20.0-3.el8_4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-11T13:38:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.AUS:python3-requests-0:2.20.0-3.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-requests-0:2.20.0-3.el8_4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15691"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.4.0.Z.AUS:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.AUS:python3-requests-0:2.20.0-3.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-requests-0:2.20.0-3.el8_4.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.Z.AUS:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.AUS:python3-requests-0:2.20.0-3.el8_4.noarch",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python-requests-0:2.20.0-3.el8_4.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-requests-0:2.20.0-3.el8_4.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:13604
Vulnerability from csaf_redhat - Published: 2025-08-11 10:27 - Updated: 2026-03-10 16:02A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-requests is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:13604",
"url": "https://access.redhat.com/errata/RHSA-2025:13604"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13604.json"
}
],
"title": "Red Hat Security Advisory: python-requests security update",
"tracking": {
"current_release_date": "2026-03-10T16:02:40+00:00",
"generator": {
"date": "2026-03-10T16:02:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:13604",
"initial_release_date": "2025-08-11T10:27:10+00:00",
"revision_history": [
{
"date": "2025-08-11T10:27:10+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-11T10:27:10+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:02:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.32.4-1.el10_0.src",
"product": {
"name": "python-requests-0:2.32.4-1.el10_0.src",
"product_id": "python-requests-0:2.32.4-1.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.32.4-1.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-requests-0:2.32.4-1.el10_0.noarch",
"product": {
"name": "python3-requests-0:2.32.4-1.el10_0.noarch",
"product_id": "python3-requests-0:2.32.4-1.el10_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests@2.32.4-1.el10_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.32.4-1.el10_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python-requests-0:2.32.4-1.el10_0.src"
},
"product_reference": "python-requests-0:2.32.4-1.el10_0.src",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.32.4-1.el10_0.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-requests-0:2.32.4-1.el10_0.noarch"
},
"product_reference": "python3-requests-0:2.32.4-1.el10_0.noarch",
"relates_to_product_reference": "BaseOS-10.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-10.0.Z:python-requests-0:2.32.4-1.el10_0.src",
"BaseOS-10.0.Z:python3-requests-0:2.32.4-1.el10_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-11T10:27:10+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-10.0.Z:python-requests-0:2.32.4-1.el10_0.src",
"BaseOS-10.0.Z:python3-requests-0:2.32.4-1.el10_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13604"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-10.0.Z:python-requests-0:2.32.4-1.el10_0.src",
"BaseOS-10.0.Z:python3-requests-0:2.32.4-1.el10_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-10.0.Z:python-requests-0:2.32.4-1.el10_0.src",
"BaseOS-10.0.Z:python3-requests-0:2.32.4-1.el10_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15121
Vulnerability from csaf_redhat - Published: 2025-09-03 13:15 - Updated: 2026-03-10 16:02A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-requests is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15121",
"url": "https://access.redhat.com/errata/RHSA-2025:15121"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15121.json"
}
],
"title": "Red Hat Security Advisory: python-requests security update",
"tracking": {
"current_release_date": "2026-03-10T16:02:49+00:00",
"generator": {
"date": "2026-03-10T16:02:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15121",
"initial_release_date": "2025-09-03T13:15:23+00:00",
"revision_history": [
{
"date": "2025-09-03T13:15:23+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-03T13:15:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:02:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.20.0-3.el8_8.1.src",
"product": {
"name": "python-requests-0:2.20.0-3.el8_8.1.src",
"product_id": "python-requests-0:2.20.0-3.el8_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.20.0-3.el8_8.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-requests-0:2.20.0-3.el8_8.1.noarch",
"product": {
"name": "python3-requests-0:2.20.0-3.el8_8.1.noarch",
"product_id": "python3-requests-0:2.20.0-3.el8_8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests@2.20.0-3.el8_8.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_8.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python-requests-0:2.20.0-3.el8_8.1.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_8.1.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_8.1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-requests-0:2.20.0-3.el8_8.1.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_8.1.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_8.1.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python-requests-0:2.20.0-3.el8_8.1.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_8.1.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_8.1.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python3-requests-0:2.20.0-3.el8_8.1.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_8.1.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.E4S:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.E4S:python3-requests-0:2.20.0-3.el8_8.1.noarch",
"BaseOS-8.8.0.Z.TUS:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.TUS:python3-requests-0:2.20.0-3.el8_8.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-03T13:15:23+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.E4S:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.E4S:python3-requests-0:2.20.0-3.el8_8.1.noarch",
"BaseOS-8.8.0.Z.TUS:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.TUS:python3-requests-0:2.20.0-3.el8_8.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15121"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.E4S:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.E4S:python3-requests-0:2.20.0-3.el8_8.1.noarch",
"BaseOS-8.8.0.Z.TUS:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.TUS:python3-requests-0:2.20.0-3.el8_8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.E4S:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.E4S:python3-requests-0:2.20.0-3.el8_8.1.noarch",
"BaseOS-8.8.0.Z.TUS:python-requests-0:2.20.0-3.el8_8.1.src",
"BaseOS-8.8.0.Z.TUS:python3-requests-0:2.20.0-3.el8_8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:12519
Vulnerability from csaf_redhat - Published: 2025-08-04 15:20 - Updated: 2026-03-10 16:02A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-requests is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12519",
"url": "https://access.redhat.com/errata/RHSA-2025:12519"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12519.json"
}
],
"title": "Red Hat Security Advisory: python-requests security update",
"tracking": {
"current_release_date": "2026-03-10T16:02:36+00:00",
"generator": {
"date": "2026-03-10T16:02:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:12519",
"initial_release_date": "2025-08-04T15:20:03+00:00",
"revision_history": [
{
"date": "2025-08-04T15:20:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-04T15:20:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:02:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-requests+security-0:2.25.1-10.el9_6.noarch",
"product": {
"name": "python3-requests+security-0:2.25.1-10.el9_6.noarch",
"product_id": "python3-requests+security-0:2.25.1-10.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests%2Bsecurity@2.25.1-10.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"product": {
"name": "python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"product_id": "python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests%2Bsocks@2.25.1-10.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python3-requests-0:2.25.1-10.el9_6.noarch",
"product": {
"name": "python3-requests-0:2.25.1-10.el9_6.noarch",
"product_id": "python3-requests-0:2.25.1-10.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests@2.25.1-10.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.25.1-10.el9_6.src",
"product": {
"name": "python-requests-0:2.25.1-10.el9_6.src",
"product_id": "python-requests-0:2.25.1-10.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.25.1-10.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.1-10.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src"
},
"product_reference": "python-requests-0:2.25.1-10.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests+security-0:2.25.1-10.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch"
},
"product_reference": "python3-requests+security-0:2.25.1-10.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests+socks-0:2.25.1-10.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch"
},
"product_reference": "python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.25.1-10.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch"
},
"product_reference": "python3-requests-0:2.25.1-10.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.25.1-10.el9_6.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src"
},
"product_reference": "python-requests-0:2.25.1-10.el9_6.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests+security-0:2.25.1-10.el9_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch"
},
"product_reference": "python3-requests+security-0:2.25.1-10.el9_6.noarch",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests+socks-0:2.25.1-10.el9_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch"
},
"product_reference": "python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.25.1-10.el9_6.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch"
},
"product_reference": "python3-requests-0:2.25.1-10.el9_6.noarch",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-04T15:20:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12519"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python-requests-0:2.25.1-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+security-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests+socks-0:2.25.1-10.el9_6.noarch",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-requests-0:2.25.1-10.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15122
Vulnerability from csaf_redhat - Published: 2025-09-03 13:23 - Updated: 2026-03-10 16:02A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-requests is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15122",
"url": "https://access.redhat.com/errata/RHSA-2025:15122"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15122.json"
}
],
"title": "Red Hat Security Advisory: python-requests security update",
"tracking": {
"current_release_date": "2026-03-10T16:02:51+00:00",
"generator": {
"date": "2026-03-10T16:02:51+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15122",
"initial_release_date": "2025-09-03T13:23:28+00:00",
"revision_history": [
{
"date": "2025-09-03T13:23:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-03T13:23:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:02:51+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.20.0-3.el8_6.1.src",
"product": {
"name": "python-requests-0:2.20.0-3.el8_6.1.src",
"product_id": "python-requests-0:2.20.0-3.el8_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.20.0-3.el8_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-requests-0:2.20.0-3.el8_6.1.noarch",
"product": {
"name": "python3-requests-0:2.20.0-3.el8_6.1.noarch",
"product_id": "python3-requests-0:2.20.0-3.el8_6.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests@2.20.0-3.el8_6.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python-requests-0:2.20.0-3.el8_6.1.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-requests-0:2.20.0-3.el8_6.1.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_6.1.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python-requests-0:2.20.0-3.el8_6.1.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-requests-0:2.20.0-3.el8_6.1.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_6.1.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python-requests-0:2.20.0-3.el8_6.1.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-requests-0:2.20.0-3.el8_6.1.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_6.1.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.AUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.E4S:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.TUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:python3-requests-0:2.20.0-3.el8_6.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-03T13:23:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.E4S:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.TUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:python3-requests-0:2.20.0-3.el8_6.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15122"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.AUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.E4S:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.TUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:python3-requests-0:2.20.0-3.el8_6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.AUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.AUS:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.E4S:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.E4S:python3-requests-0:2.20.0-3.el8_6.1.noarch",
"BaseOS-8.6.0.Z.TUS:python-requests-0:2.20.0-3.el8_6.1.src",
"BaseOS-8.6.0.Z.TUS:python3-requests-0:2.20.0-3.el8_6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15723
Vulnerability from csaf_redhat - Published: 2025-09-15 01:16 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-requests is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15723",
"url": "https://access.redhat.com/errata/RHSA-2025:15723"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15723.json"
}
],
"title": "Red Hat Security Advisory: python-requests security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:12+00:00",
"generator": {
"date": "2026-03-10T16:03:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15723",
"initial_release_date": "2025-09-15T01:16:24+00:00",
"revision_history": [
{
"date": "2025-09-15T01:16:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-15T01:16:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.20.0-3.el8_2.src",
"product": {
"name": "python-requests-0:2.20.0-3.el8_2.src",
"product_id": "python-requests-0:2.20.0-3.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.20.0-3.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-requests-0:2.20.0-3.el8_2.noarch",
"product": {
"name": "python3-requests-0:2.20.0-3.el8_2.noarch",
"product_id": "python3-requests-0:2.20.0-3.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests@2.20.0-3.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-3.el8_2.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:python-requests-0:2.20.0-3.el8_2.src"
},
"product_reference": "python-requests-0:2.20.0-3.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-3.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:python3-requests-0:2.20.0-3.el8_2.noarch"
},
"product_reference": "python3-requests-0:2.20.0-3.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.AUS:python-requests-0:2.20.0-3.el8_2.src",
"BaseOS-8.2.0.Z.AUS:python3-requests-0:2.20.0-3.el8_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T01:16:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:python-requests-0:2.20.0-3.el8_2.src",
"BaseOS-8.2.0.Z.AUS:python3-requests-0:2.20.0-3.el8_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15723"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.2.0.Z.AUS:python-requests-0:2.20.0-3.el8_2.src",
"BaseOS-8.2.0.Z.AUS:python3-requests-0:2.20.0-3.el8_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.AUS:python-requests-0:2.20.0-3.el8_2.src",
"BaseOS-8.2.0.Z.AUS:python3-requests-0:2.20.0-3.el8_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15616
Vulnerability from csaf_redhat - Published: 2025-09-10 12:20 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for resource-agents is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15616",
"url": "https://access.redhat.com/errata/RHSA-2025:15616"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15616.json"
}
],
"title": "Red Hat Security Advisory: resource-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:07+00:00",
"generator": {
"date": "2026-03-10T16:03:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15616",
"initial_release_date": "2025-09-10T12:20:52+00:00",
"revision_history": [
{
"date": "2025-09-10T12:20:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-10T12:20:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::highavailability"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-40.el8_8.11.src",
"product": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.src",
"product_id": "resource-agents-0:4.9.0-40.el8_8.11.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-40.el8_8.11?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"product": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"product_id": "resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-40.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"product": {
"name": "resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"product_id": "resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-40.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"product_id": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-40.el8_8.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"product_id": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-40.el8_8.11?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"product": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"product_id": "resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-40.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"product": {
"name": "resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"product_id": "resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun@4.9.0-40.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"product": {
"name": "resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"product_id": "resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-gcp@4.9.0-40.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"product": {
"name": "resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"product_id": "resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-40.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"product_id": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-40.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"product": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"product_id": "resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun-debuginfo@4.9.0-40.el8_8.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"product_id": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-40.el8_8.11?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.ppc64le"
},
"product_reference": "resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.src as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.src"
},
"product_reference": "resource-agents-0:4.9.0-40.el8_8.11.src",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le"
},
"product_reference": "resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.src as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.src"
},
"product_reference": "resource-agents-0:4.9.0-40.el8_8.11.src",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.8)",
"product_id": "HighAvailability-8.8.0.Z.TUS:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"relates_to_product_reference": "HighAvailability-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-10T12:20:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15616"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.E4S:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.ppc64le",
"HighAvailability-8.8.0.Z.E4S:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.src",
"HighAvailability-8.8.0.Z.TUS:resource-agents-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-debugsource-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-gcp-0:4.9.0-40.el8_8.11.x86_64",
"HighAvailability-8.8.0.Z.TUS:resource-agents-paf-0:4.9.0-40.el8_8.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:14999
Vulnerability from csaf_redhat - Published: 2025-09-02 02:49 - Updated: 2026-03-10 16:02A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for resource-agents is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14999",
"url": "https://access.redhat.com/errata/RHSA-2025:14999"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14999.json"
}
],
"title": "Red Hat Security Advisory: resource-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:02:48+00:00",
"generator": {
"date": "2026-03-10T16:02:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:14999",
"initial_release_date": "2025-09-02T02:49:59+00:00",
"revision_history": [
{
"date": "2025-09-02T02:49:59+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-02T02:49:59+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:02:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8_10.16.src",
"product": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.src",
"product_id": "resource-agents-0:4.9.0-54.el8_10.16.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10.16?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"product": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"product_id": "resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"product_id": "resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8_10.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8_10.16?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8_10.16?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"product": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"product_id": "resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"product_id": "resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8_10.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8_10.16?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8_10.16?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"product": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"product_id": "resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"product": {
"name": "resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"product_id": "resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun@4.9.0-54.el8_10.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"product": {
"name": "resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"product_id": "resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-gcp@4.9.0-54.el8_10.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"product_id": "resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8_10.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8_10.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"product": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"product_id": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun-debuginfo@4.9.0-54.el8_10.16?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8_10.16?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8_10.16.s390x",
"product": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.s390x",
"product_id": "resource-agents-0:4.9.0-54.el8_10.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8_10.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"product_id": "resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8_10.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8_10.16?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8_10.16?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.src as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.src",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.src as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.src",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-02T02:49:59+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14999"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"HighAvailability-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.src",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debuginfo-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-debugsource-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-gcp-0:4.9.0-54.el8_10.16.x86_64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.aarch64",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.ppc64le",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.s390x",
"ResilientStorage-8.10.0.Z.MAIN.EUS:resource-agents-paf-0:4.9.0-54.el8_10.16.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15615
Vulnerability from csaf_redhat - Published: 2025-09-10 12:28 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15615",
"url": "https://access.redhat.com/errata/RHSA-2025:15615"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15615.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:03+00:00",
"generator": {
"date": "2026-03-10T16:03:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15615",
"initial_release_date": "2025-09-10T12:28:07+00:00",
"revision_history": [
{
"date": "2025-09-10T12:28:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-10T12:28:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::highavailability"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-89.el8_6.15.src",
"product": {
"name": "fence-agents-0:4.2.1-89.el8_6.15.src",
"product_id": "fence-agents-0:4.2.1-89.el8_6.15.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-89.el8_6.15?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.15?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-89.el8_6.15?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-89.el8_6.15?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"product_id": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-89.el8_6.15?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.15?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.15?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.15?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-89.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-89.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-89.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-89.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-89.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-89.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-89.el8_6.15?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-89.el8_6.15?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-89.el8_6.15.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-0:4.2.1-89.el8_6.15.src"
},
"product_reference": "fence-agents-0:4.2.1-89.el8_6.15.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-89.el8_6.15.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src"
},
"product_reference": "fence-agents-0:4.2.1-89.el8_6.15.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-89.el8_6.15.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src"
},
"product_reference": "fence-agents-0:4.2.1-89.el8_6.15.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-89.el8_6.15.src as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src"
},
"product_reference": "fence-agents-0:4.2.1-89.el8_6.15.src",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-89.el8_6.15.src as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src"
},
"product_reference": "fence-agents-0:4.2.1-89.el8_6.15.src",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-10T12:28:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15615"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.AUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.AUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.AUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"AppStream-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"AppStream-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"AppStream-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.aarch64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.ppc64le",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.s390x",
"HighAvailability-8.6.0.Z.E4S:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.E4S:fence-agents-zvm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-0:4.2.1-89.el8_6.15.src",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aliyun-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-all-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-amt-ws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-apc-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-aws-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-azure-arm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-bladecenter-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-brocade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-mds-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-cisco-ucs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-common-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-compute-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-debugsource-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-drac5-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eaton-snmp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-emerson-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-eps-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-gce-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-heuristics-ping-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-hpblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-powervs-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibm-vpc-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ibmblade-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ifmib-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-moonshot-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-mp-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo-ssh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ilo2-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-intelmodular-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipdu-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-ipmilan-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kdump-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-kubevirt-debuginfo-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-lpar-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-mpath-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-redfish-0:4.2.1-89.el8_6.15.x86_64",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rhevm-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsa-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-rsb-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-sbd-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-scsi-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-virsh-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-rest-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-vmware-soap-0:4.2.1-89.el8_6.15.noarch",
"HighAvailability-8.6.0.Z.TUS:fence-agents-wti-0:4.2.1-89.el8_6.15.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:13234
Vulnerability from csaf_redhat - Published: 2025-08-06 12:39 - Updated: 2026-03-10 16:02A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-requests is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:13234",
"url": "https://access.redhat.com/errata/RHSA-2025:13234"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13234.json"
}
],
"title": "Red Hat Security Advisory: python-requests security update",
"tracking": {
"current_release_date": "2026-03-10T16:02:37+00:00",
"generator": {
"date": "2026-03-10T16:02:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:13234",
"initial_release_date": "2025-08-06T12:39:07+00:00",
"revision_history": [
{
"date": "2025-08-06T12:39:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-06T12:39:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:02:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-requests-0:2.20.0-6.el8_10.src",
"product": {
"name": "python-requests-0:2.20.0-6.el8_10.src",
"product_id": "python-requests-0:2.20.0-6.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-requests@2.20.0-6.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-requests-0:2.20.0-6.el8_10.noarch",
"product": {
"name": "python3-requests-0:2.20.0-6.el8_10.noarch",
"product_id": "python3-requests-0:2.20.0-6.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-requests@2.20.0-6.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-0:2.20.0-6.el8_10.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python-requests-0:2.20.0-6.el8_10.src"
},
"product_reference": "python-requests-0:2.20.0-6.el8_10.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-0:2.20.0-6.el8_10.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-requests-0:2.20.0-6.el8_10.noarch"
},
"product_reference": "python3-requests-0:2.20.0-6.el8_10.noarch",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.10.0.Z.MAIN.EUS:python-requests-0:2.20.0-6.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-requests-0:2.20.0-6.el8_10.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-06T12:39:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:python-requests-0:2.20.0-6.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-requests-0:2.20.0-6.el8_10.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13234"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.10.0.Z.MAIN.EUS:python-requests-0:2.20.0-6.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-requests-0:2.20.0-6.el8_10.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.10.0.Z.MAIN.EUS:python-requests-0:2.20.0-6.el8_10.src",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-requests-0:2.20.0-6.el8_10.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2026:4215
Vulnerability from csaf_redhat - Published: 2026-03-10 15:34 - Updated: 2026-03-17 06:47Azure Storage Library Information Disclosure Vulnerability
A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.
A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.
A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.
A flaw was found in pyjwt. The library uses weak encryption, allowing an attacker to potentially decrypt sensitive data. A network-based attacker can exploit this vulnerability without authentication, possibly resulting in a denial of service or data exposure. This weakness stems from the use of inadequate cryptographic algorithms.
A path traversal vulnerability in the Python setuptools library allows attackers with limited system access to write files outside the intended temporary directory by manipulating package download URLs. This flaw bypasses basic filename sanitization and can lead to unauthorized overwrites of important system files, creating opportunities for further compromise. While it doesn't expose data or require user interaction, it poses a high integrity risk and is especially concerning in environments that rely on automated package handling or internal tooling built on setuptools.
A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic("unreachable") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.
A flaw was found in urllib3. The `PoolManager` class allows redirects to be disabled by configuring retries in a specific manner, effectively bypassing intended HTTP redirection behavior. A network attacker can leverage this configuration to manipulate request flows and disrupt service. This bypass occurs through improper handling of retry parameters during PoolManager instantiation. This issue can reult in a denial of service or unintended data exposure due to altered request destinations.
A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.
A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.
A denial of service flaw has been discovered in the Axios npm package. When Axios runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response. This path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested responseType: 'stream'.
Authlib’s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 “must‑understand” semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed‑language fleets, this enables split‑brain verification and can lead to policy bypass, replay, or privilege escalation.
A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.
A denial of service flaw has been discovered in the python Authlib package. Authlib’s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url‑encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.
A flaw was found in auth0/node-jws. This vulnerability allows improper signature verification via using the HS256 (Hash-based Message Authentication Code using SHA-256) algorithm under specific conditions, where applications use the jws.createVerify() function for HMAC (Keyed-Hash Message Authentication Code) algorithms and user-provided data from the JSON (JavaScript Object Notation) Web Signature protected header or payload in HMAC secret lookup routines.
A flaw was found in urllib3 Python library that could lead to a Denial of Service condition. A remote, malicious server can exploit this flaw by responding to a client request with an HTTP message that uses an excessive number of chained compression algorithms. This unlimited decompression chain causes the client system to consume a virtually unbounded amount of CPU resources and memory. The high resource usage leads to service disruption, making the application unresponsive.
A decompression handling flaw has been discovered in urllib3. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side, even if the application only requested a small chunk of data.
A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.
urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.
A path traversal flaw has been discovered in the python wheel too. The unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat Quay 3.14.6 is now available with bug fixes.",
"title": "Topic"
},
{
"category": "general",
"text": "Quay 3.14.6",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:4215",
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47273",
"url": "https://access.redhat.com/security/cve/CVE-2025-47273"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2022-30187",
"url": "https://access.redhat.com/security/cve/CVE-2022-30187"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-34156",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-47081",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-12816",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-15284",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-47913",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-50181",
"url": "https://access.redhat.com/security/cve/CVE-2025-50181"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52881",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58183",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-58754",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-59420",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61729",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-61920",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-65945",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66418",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66471",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-66506",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-21441",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2026-24049",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-45768",
"url": "https://access.redhat.com/security/cve/CVE-2025-45768"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_4215.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Quay 3.14.6",
"tracking": {
"current_release_date": "2026-03-17T06:47:42+00:00",
"generator": {
"date": "2026-03-17T06:47:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.3"
}
},
"id": "RHSA-2026:4215",
"initial_release_date": "2026-03-10T15:34:38+00:00",
"revision_history": [
{
"date": "2026-03-10T15:34:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-10T15:34:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-17T06:47:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Quay 3.14",
"product": {
"name": "Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:quay:3.14::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Quay"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-bundle@sha256%3Aa7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097791"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-bundle@sha256%3Ac4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097803"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Afd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3Aaea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Aa4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-bundle@sha256%3Aef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773101667"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70?arch=amd64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3A2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899?arch=arm64\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Aaa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3A0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3Aaad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3Ae2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90?arch=ppc64le\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"product_id": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-container-security-operator-rhel8@sha256%3A14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097298"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"product_id": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-bridge-operator-rhel8@sha256%3Ac33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097302"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-qemu-rhcos-rhel8@sha256%3Abec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1771008628"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"product_id": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-builder-rhel8@sha256%3A78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1771265622"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"product": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"product_id": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/clair-rhel8@sha256%3A698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097327"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"product_id": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-operator-rhel8@sha256%3A420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097311"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"product": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"product_id": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/quay-rhel8@sha256%3A51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4?arch=s390x\u0026repository_url=registry.redhat.io/quay\u0026tag=1773097621"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le"
},
"product_reference": "registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64 as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"relates_to_product_reference": "Red Hat Quay 3.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le as a component of Red Hat Quay 3.14",
"product_id": "Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
},
"product_reference": "registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le",
"relates_to_product_reference": "Red Hat Quay 3.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-30187",
"discovery_date": "2025-05-06T16:30:59.189000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"notes": [
{
"category": "description",
"text": "Azure Storage Library Information Disclosure Vulnerability",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-30187"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-30187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30187"
}
],
"release_date": "2022-07-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Azure Storage: Azure Storage Library Information Disclosure Vulnerability"
},
{
"cve": "CVE-2024-34156",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2024-09-06T21:20:09.377905+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2310528"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the encoding/gob package of the Golang standard library. Calling Decoder.Decoding, a message that contains deeply nested structures, can cause a panic due to stack exhaustion. This is a follow-up to CVE-2022-30635.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Go\u0027s `encoding/gob` package is of high severity because it exposes applications to potential Denial of Service (DoS) attacks through stack exhaustion. Since `gob` relies on recursive function calls to decode nested structures, an attacker could exploit this by sending crafted messages with excessively deep nesting, causing the application to panic due to stack overflow. This risk is particularly important in scenarios where untrusted or external input is processed, as it can lead to system unavailability or crashes, undermining the reliability and availability of services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-34156"
},
{
"category": "external",
"summary": "RHBZ#2310528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-34156"
},
{
"category": "external",
"summary": "https://go.dev/cl/611239",
"url": "https://go.dev/cl/611239"
},
{
"category": "external",
"summary": "https://go.dev/issue/69139",
"url": "https://go.dev/issue/69139"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk",
"url": "https://groups.google.com/g/golang-dev/c/S9POB9NCTdk"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2024-3106",
"url": "https://pkg.go.dev/vuln/GO-2024-3106"
}
],
"release_date": "2024-09-06T21:15:12.020000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "encoding/gob: golang: Calling Decoder.Decode on a message which contains deeply nested structures can cause a panic due to stack exhaustion"
},
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
},
{
"cve": "CVE-2025-12816",
"cwe": {
"id": "CWE-179",
"name": "Incorrect Behavior Order: Early Validation"
},
"discovery_date": "2025-11-25T20:01:05.875196+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2417097"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in node-forge. This vulnerability allows unauthenticated attackers to bypass downstream cryptographic verifications and security decisions via crafting ASN.1 (Abstract Syntax Notation One) structures to desynchronize schema validations, yielding a semantic divergence.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products due to an interpretation conflict in the node-forge library. An unauthenticated attacker could exploit this flaw by crafting malicious ASN.1 structures, leading to a bypass of cryptographic verifications and security decisions in affected applications. This impacts various Red Hat products that utilize node-forge for cryptographic operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-12816"
},
{
"category": "external",
"summary": "RHBZ#2417097",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2417097"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12816"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge",
"url": "https://github.com/digitalbazaar/forge"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/pull/1124",
"url": "https://github.com/digitalbazaar/forge/pull/1124"
},
{
"category": "external",
"summary": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq",
"url": "https://github.com/digitalbazaar/forge/security/advisories/GHSA-5gfm-wpxj-wjgq"
},
{
"category": "external",
"summary": "https://kb.cert.org/vuls/id/521113",
"url": "https://kb.cert.org/vuls/id/521113"
},
{
"category": "external",
"summary": "https://www.npmjs.com/package/node-forge",
"url": "https://www.npmjs.com/package/node-forge"
}
],
"release_date": "2025-11-25T19:15:50.243000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-forge: node-forge: Interpretation conflict vulnerability allows bypassing cryptographic verifications"
},
{
"cve": "CVE-2025-15284",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-29T23:00:58.541337+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2425946"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in qs, a module used for parsing query strings. A remote attacker can exploit an improper input validation vulnerability by sending specially crafted HTTP requests that use bracket notation (e.g., `a[]=value`). This bypasses the `arrayLimit` option, which is designed to limit the size of parsed arrays and prevent resource exhaustion. Successful exploitation can lead to memory exhaustion, causing a Denial of Service (DoS) where the application crashes or becomes unresponsive, making the service unavailable to users.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "qs: qs: Denial of Service via improper input validation in array parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat products that utilize the `qs` module for parsing query strings, particularly when processing user-controlled input with bracket notation. The `arrayLimit` option, intended to prevent resource exhaustion, is bypassed when bracket notation (`a[]=value`) is used, allowing a remote attacker to cause a denial of service through memory exhaustion. This can lead to application crashes or unresponsiveness, making the service unavailable.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-15284"
},
{
"category": "external",
"summary": "RHBZ#2425946",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2425946"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15284"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9",
"url": "https://github.com/ljharb/qs/commit/3086902ecf7f088d0d1803887643ac6c03d415b9"
},
{
"category": "external",
"summary": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p",
"url": "https://github.com/ljharb/qs/security/advisories/GHSA-6rw7-vpxm-498p"
}
],
"release_date": "2025-12-29T22:56:45.240000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "qs: qs: Denial of Service via improper input validation in array parsing"
},
{
"cve": "CVE-2025-45768",
"discovery_date": "2025-07-31T21:01:30.698283+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in pyjwt. The library uses weak encryption, allowing an attacker to potentially decrypt sensitive data. A network-based attacker can exploit this vulnerability without authentication, possibly resulting in a denial of service or data exposure. This weakness stems from the use of inadequate cryptographic algorithms.",
"title": "Vulnerability description"
},
{
"category": "other",
"text": "This CVE has been disputed by the PyJWT. The developers of PyJWT confirm that this issue is not a flaw in the library\u0027s function but rather a potential risk if an application developer chooses to use weak, short cryptographic keys.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-45768"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
}
],
"release_date": "2025-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pyjwt: pyjwt Weak Encryption Vulnerability"
},
{
"cve": "CVE-2025-47273",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-05-17T16:00:41.145177+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2366982"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability in the Python setuptools library allows attackers with limited system access to write files outside the intended temporary directory by manipulating package download URLs. This flaw bypasses basic filename sanitization and can lead to unauthorized overwrites of important system files, creating opportunities for further compromise. While it doesn\u0027t expose data or require user interaction, it poses a high integrity risk and is especially concerning in environments that rely on automated package handling or internal tooling built on setuptools.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "setuptools: Path Traversal Vulnerability in setuptools PackageIndex",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security has rated this vulnerability \"Moderate\" based on the impact of the damage caused by a successful exploitation and the pre-requisites.\n\n* Exploitation requires that the attacker have limited code execution access to a Python environment where they can trigger the vulnerable PackageIndex.download() function\u2014this might be via a script, plugin, or automated job. Full admin rights aren\u0027t needed but a user with no access at all will be unable to exploit this vulnerability.\n* The vulnerability impacts the integrity of the system within the same security boundary\u2014it does not enable access or compromise across trust boundaries (e.g., from one container to another or from user space to kernel).\n* Successful exploitation only allows the attacker to \"create\" new files. The vulnerability does not provide access to existing files and by an extension to any confidential information. \n* Arbitrary file writes can overwrite critical config files, executables, or scripts. This can lead to persistent code execution, system misconfiguration, or unauthorized behavior, especially in automated environments. While overwriting critical files could theoretically lead to service disruption, the vulnerability in isolation does not inherently cause denial of service. The exploit doesn\u0027t target availability directly, and in many cases, systems may continue running.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47273"
},
{
"category": "external",
"summary": "RHBZ#2366982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366982"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47273",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47273"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88",
"url": "https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b",
"url": "https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/issues/4946",
"url": "https://github.com/pypa/setuptools/issues/4946"
},
{
"category": "external",
"summary": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf",
"url": "https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf"
}
],
"release_date": "2025-05-17T15:46:11.399000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "setuptools: Path Traversal Vulnerability in setuptools PackageIndex"
},
{
"cve": "CVE-2025-47913",
"discovery_date": "2025-11-13T22:01:26.092452+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2414943"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in golang.org/x/crypto/ssh/agent causes the SSH agent client to panic when a peer responds with the generic SSH_AGENT_SUCCESS (0x06) message to requests expecting typed replies (e.g., List, Sign). The unmarshal layer produces an unexpected message type, which the client code does not handle, leading to panic(\"unreachable\") or a nil-pointer dereference. A malicious agent or forwarded connection can exploit this to terminate the client process.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability was marked as Important because it allows any malicious or misbehaving SSH agent to force a crash in the client process using a single valid protocol byte. The panic occurs before the client has a chance to validate message structure or recover, which means an attacker controlling\u2014or intercepting\u2014SSH agent traffic can reliably terminate processes that rely on agent interactions. In environments where SSH agents operate over forwarded sockets, shared workspaces, or CI/CD runners, this turns into a reliable, unauthenticated remote denial of service against critical automation or developer tooling. The flaw also stems from unsafe assumptions in the unmarshalling logic, where unexpected but protocol-legal message types drop into \u201cunreachable\u201d code paths instead of being handled gracefully\u2014making it a design-level reliability break rather than a simple error-handling bug. For this reason, it is rated as an important availability-impacting vulnerability rather than a moderate issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-47913"
},
{
"category": "external",
"summary": "RHBZ#2414943",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2414943"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47913"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-hcg3-q754-cr77",
"url": "https://github.com/advisories/GHSA-hcg3-q754-cr77"
},
{
"category": "external",
"summary": "https://go.dev/cl/700295",
"url": "https://go.dev/cl/700295"
},
{
"category": "external",
"summary": "https://go.dev/issue/75178",
"url": "https://go.dev/issue/75178"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4116",
"url": "https://pkg.go.dev/vuln/GO-2025-4116"
}
],
"release_date": "2025-11-13T21:29:39.907000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "No mitigation is currently available that meets Red Hat Product Security\u2019s standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "golang.org/x/crypto/ssh/agent: golang.org/x/crypto/ssh/agent: SSH client panic due to unexpected SSH_AGENT_SUCCESS"
},
{
"cve": "CVE-2025-50181",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2025-06-19T02:00:42.866992+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373799"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3. The `PoolManager` class allows redirects to be disabled by configuring retries in a specific manner, effectively bypassing intended HTTP redirection behavior. A network attacker can leverage this configuration to manipulate request flows and disrupt service. This bypass occurs through improper handling of retry parameters during PoolManager instantiation. This issue can reult in a denial of service or unintended data exposure due to altered request destinations.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A flaw was found in the urllib3 library where it could be tricked into disclosing the Proxy-Authorization header to a destination server when a CONNECT tunnel is used. An attacker can set up a malicious redirect to a crafted URL, which, when followed by the client application, will cause the Proxy-Authorization header to be sent to the attacker-controlled server. This leaks sensitive credentials for the proxy. The impact is primarily on confidentiality. While urllib3 is a ubiquitous component, the vulnerability requires a specific scenario where a user is connecting to a proxy that requires authentication and is redirected to a malicious endpoint. This lowers the exploitability compared to a direct, unauthenticated remote attack, thus, warranting a Moderate severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-50181"
},
{
"category": "external",
"summary": "RHBZ#2373799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373799"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-50181",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50181"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857",
"url": "https://github.com/urllib3/urllib3/commit/f05b1329126d5be6de501f9d1e3e36738bc08857"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-pq67-6m6q-mj2v"
}
],
"release_date": "2025-06-19T01:08:00.340000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation"
},
{
"cve": "CVE-2025-52881",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-10-17T14:19:18.652000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2404715"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in runc. This attack is a more sophisticated variant of CVE-2019-16884, which was a flaw that allowed an attacker to trick runc into writing the LSM process labels for a container process into a dummy tmpfs file and thus not apply the correct LSM labels to the container process. The mitigation applied for CVE-2019-16884 was fairly limited and effectively only caused runc to verify that when we write LSM labels that those labels are actual procfs files.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat considers this as an Important flaw since the impact is limited to local attack with minimal privileges in order to jeopardize the environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52881"
},
{
"category": "external",
"summary": "RHBZ#2404715",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2404715"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52881"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm",
"url": "https://github.com/opencontainers/runc/security/advisories/GHSA-cgrx-mc8f-2prm"
},
{
"category": "external",
"summary": "https://github.com/opencontainers/selinux/pull/237",
"url": "https://github.com/opencontainers/selinux/pull/237"
}
],
"release_date": "2025-11-05T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Potential mitigations for this issue include:\n\n* Using rootless containers, as doing so will block most of the inadvertent writes (runc would run with reduced privileges, making attempts to write to procfs files ineffective).\n* Based on our analysis, neither AppArmor or SELinux can protect against the full version of the redirected write attack. The container runtime is generally privileged enough to write to arbitrary procfs files, which is more than sufficient to cause a container breakout.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "runc: opencontainers/selinux: container escape and denial of service due to arbitrary write gadgets and procfs write redirects"
},
{
"cve": "CVE-2025-58183",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-29T23:01:50.573951+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2407258"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the archive/tar package in the Go standard library. tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A specially crafted tar archive with a pax header indicating a big number of sparse regions can cause a Go program to try to allocate a large amount of memory, causing an out-of-memory condition and resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this issue, an attacker needs to be able to process a specially crafted GNU tar pax 1.0 archive with the application using the archive/tar package. Additionally, this issue can cause the Go application to allocate a large amount of memory, eventually leading to an out-of-memory condition and resulting in a denial of service with no other security impact. Due to these reasons, this flaw has been rated with a moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58183"
},
{
"category": "external",
"summary": "RHBZ#2407258",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2407258"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58183"
},
{
"category": "external",
"summary": "https://go.dev/cl/709861",
"url": "https://go.dev/cl/709861"
},
{
"category": "external",
"summary": "https://go.dev/issue/75677",
"url": "https://go.dev/issue/75677"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI",
"url": "https://groups.google.com/g/golang-announce/c/4Emdl2iQ_bI"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4014",
"url": "https://pkg.go.dev/vuln/GO-2025-4014"
}
],
"release_date": "2025-10-29T22:10:14.376000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: Unbounded allocation when parsing GNU sparse map"
},
{
"cve": "CVE-2025-58754",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-12T02:00:53.897605+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2394735"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the Axios npm package. When Axios runs on Node.js and is given a URL with the `data:` scheme, it does not perform HTTP. Instead, its Node http adapter decodes the entire payload into memory (`Buffer`/`Blob`) and returns a synthetic 200 response.\nThis path ignores `maxContentLength` / `maxBodyLength` (which only protect HTTP responses), so an attacker can supply a very large `data:` URI and cause the process to allocate unbounded memory and crash (DoS), even if the caller requested responseType: \u0027stream\u0027.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "axios: Axios DoS via lack of data size check",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Availability impact is limited to the application which bundles axios and not the host Red Hat system.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-58754"
},
{
"category": "external",
"summary": "RHBZ#2394735",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394735"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58754"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593",
"url": "https://github.com/axios/axios/commit/945435fc51467303768202250debb8d4ae892593"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/pull/7011",
"url": "https://github.com/axios/axios/pull/7011"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/releases/tag/v1.12.0",
"url": "https://github.com/axios/axios/releases/tag/v1.12.0"
},
{
"category": "external",
"summary": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj",
"url": "https://github.com/axios/axios/security/advisories/GHSA-4hjh-wcwx-xvwj"
}
],
"release_date": "2025-09-12T01:16:40.513000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "axios: Axios DoS via lack of data size check"
},
{
"cve": "CVE-2025-59420",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2025-09-22T18:01:35.379361+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2397460"
}
],
"notes": [
{
"category": "description",
"text": "Authlib\u2019s JWS verification accepts tokens that declare unknown critical header parameters (crit), violating RFC 7515 \u201cmust\u2011understand\u201d semantics. An attacker can craft a signed token with a critical header (for example, bork or cnf) that strict verifiers reject but Authlib accepts. In mixed\u2011language fleets, this enables split\u2011brain verification and can lead to policy bypass, replay, or privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib RFC violation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59420"
},
{
"category": "external",
"summary": "RHBZ#2397460",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397460"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59420"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59420"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df",
"url": "https://github.com/authlib/authlib/commit/6b1813e4392eb7c168c276099ff7783b176479df"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-9ggr-2464-2j32"
}
],
"release_date": "2025-09-22T17:28:53.869000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib RFC violation"
},
{
"cve": "CVE-2025-61729",
"cwe": {
"id": "CWE-1050",
"name": "Excessive Platform Resource Consumption within a Loop"
},
"discovery_date": "2025-12-02T20:01:45.330964+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418462"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A remote attacker could exploit this vulnerability by providing a specially crafted certificate during the error string construction process within the `HostnameError.Error()` function. This flaw, caused by unbounded string concatenation, leads to excessive resource consumption. Successful exploitation can result in a denial of service (DoS) for the affected system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61729"
},
{
"category": "external",
"summary": "RHBZ#2418462",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418462"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61729"
},
{
"category": "external",
"summary": "https://go.dev/cl/725920",
"url": "https://go.dev/cl/725920"
},
{
"category": "external",
"summary": "https://go.dev/issue/76445",
"url": "https://go.dev/issue/76445"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4",
"url": "https://groups.google.com/g/golang-announce/c/8FJoBkPddm4"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2025-4155",
"url": "https://pkg.go.dev/vuln/GO-2025-4155"
}
],
"release_date": "2025-12-02T18:54:10.166000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "crypto/x509: golang: Denial of Service due to excessive resource consumption via crafted certificate"
},
{
"cve": "CVE-2025-61920",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-10-10T20:01:12.833962+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2403179"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw has been discovered in the python Authlib package. Authlib\u2019s JOSE implementation accepts unbounded JWS/JWT header and signature segments. A remote attacker can craft a token whose base64url\u2011encoded header or signature spans hundreds of megabytes. During verification, Authlib decodes and parses the full input before it is rejected, driving CPU and memory consumption to hostile levels and enabling denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "authlib: Authlib Denial of Service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-61920"
},
{
"category": "external",
"summary": "RHBZ#2403179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-61920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61920"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61920"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e",
"url": "https://github.com/authlib/authlib/commit/867e3f87b072347a1ae9cf6983cc8bbf88447e5e"
},
{
"category": "external",
"summary": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9",
"url": "https://github.com/authlib/authlib/security/advisories/GHSA-pq5p-34cr-23v9"
}
],
"release_date": "2025-10-10T19:25:07.679000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Users unable to upgrade may manually enforce input size limits before handing tokens to Authlib and/or use application-level throttling to reduce amplification risk.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "authlib: Authlib Denial of Service"
},
{
"cve": "CVE-2025-65945",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2025-12-04T19:01:14.733682+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2418904"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in auth0/node-jws. This vulnerability allows improper signature verification via using the HS256 (Hash-based Message Authentication Code using SHA-256) algorithm under specific conditions, where applications use the jws.createVerify() function for HMAC (Keyed-Hash Message Authentication Code) algorithms and user-provided data from the JSON (JavaScript Object Notation) Web Signature protected header or payload in HMAC secret lookup routines.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-65945"
},
{
"category": "external",
"summary": "RHBZ#2418904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65945"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e",
"url": "https://github.com/auth0/node-jws/commit/34c45b2c04434f925b638de6a061de9339c0ea2e"
},
{
"category": "external",
"summary": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x",
"url": "https://github.com/auth0/node-jws/security/advisories/GHSA-869p-cjfg-cm3x"
}
],
"release_date": "2025-12-04T18:45:37.517000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "node-jws: auth0/node-jws: Improper signature verification in HS256 algorithm"
},
{
"cve": "CVE-2025-66418",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-12-05T17:01:20.277857+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419455"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3 Python library that could lead to a Denial of Service condition. A remote, malicious server can exploit this flaw by responding to a client request with an HTTP message that uses an excessive number of chained compression algorithms. This unlimited decompression chain causes the client system to consume a virtually unbounded amount of CPU resources and memory. The high resource usage leads to service disruption, making the application unresponsive.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66418"
},
{
"category": "external",
"summary": "RHBZ#2419455",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419455"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66418"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8",
"url": "https://github.com/urllib3/urllib3/commit/24d7b67eac89f94e11003424bcf0d8f7b72222a8"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-gm62-xv2j-4w53"
}
],
"release_date": "2025-12-05T16:02:15.271000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3: Unbounded decompression chain leads to resource exhaustion"
},
{
"cve": "CVE-2025-66471",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2025-12-05T17:02:21.597728+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419467"
}
],
"notes": [
{
"category": "description",
"text": "A decompression handling flaw has been discovered in urllib3. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data; CWE-409) on the client side, even if the application only requested a small chunk of data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 Streaming API improperly handles highly compressed data",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66471"
},
{
"category": "external",
"summary": "RHBZ#2419467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66471"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7",
"url": "https://github.com/urllib3/urllib3/commit/c19571de34c47de3a766541b041637ba5f716ed7"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-2xpw-w6gg-jr37"
}
],
"release_date": "2025-12-05T16:06:08.531000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 Streaming API improperly handles highly compressed data"
},
{
"cve": "CVE-2025-66506",
"cwe": {
"id": "CWE-405",
"name": "Asymmetric Resource Consumption (Amplification)"
},
"discovery_date": "2025-12-04T23:01:20.507333+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2419056"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Fulcio, a free-to-use certificate authority. This vulnerability allows a denial of service (DoS) due to excessive memory allocation when processing a malicious OpenID Connect (OIDC) identity token containing numerous period characters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Important for Red Hat as Fulcio, a certificate authority used for issuing code signing certificates, is susceptible to a denial of service when processing a specially crafted OpenID Connect (OIDC) token. This could lead to resource exhaustion and service unavailability in affected Red Hat products that utilize Fulcio.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-66506"
},
{
"category": "external",
"summary": "RHBZ#2419056",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2419056"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-66506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66506"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66506"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a",
"url": "https://github.com/sigstore/fulcio/commit/765a0e57608b9ef390e1eeeea8595b9054c63a5a"
},
{
"category": "external",
"summary": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw",
"url": "https://github.com/sigstore/fulcio/security/advisories/GHSA-f83f-xpx7-ffpw"
}
],
"release_date": "2025-12-04T22:04:41.637000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "github.com/sigstore/fulcio: Fulcio: Denial of Service via crafted OpenID Connect (OIDC) token"
},
{
"cve": "CVE-2026-21441",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"discovery_date": "2026-01-07T23:01:59.422078+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2427726"
}
],
"notes": [
{
"category": "description",
"text": "urllib3 is an HTTP client library for Python. urllib3\u0027s streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-21441"
},
{
"category": "external",
"summary": "RHBZ#2427726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21441"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b",
"url": "https://github.com/urllib3/urllib3/commit/8864ac407bba8607950025e0979c4c69bc7abc7b"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-38jv-5279-wg99"
}
],
"release_date": "2026-01-07T22:09:01.936000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "urllib3: urllib3 vulnerable to decompression-bomb safeguard bypass when following HTTP redirects (streaming API)"
},
{
"cve": "CVE-2026-24049",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2026-01-22T05:00:54.709179+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2431959"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal flaw has been discovered in the python wheel too. The unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"known_not_affected": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2026-24049"
},
{
"category": "external",
"summary": "RHBZ#2431959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2431959"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24049"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef",
"url": "https://github.com/pypa/wheel/commit/7a7d2de96b22a9adf9208afcc9547e1001569fef"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/releases/tag/0.46.2",
"url": "https://github.com/pypa/wheel/releases/tag/0.46.2"
},
{
"category": "external",
"summary": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx",
"url": "https://github.com/pypa/wheel/security/advisories/GHSA-8rrh-rw8j-w5fx"
}
],
"release_date": "2026-01-22T04:02:08.706000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-10T15:34:38+00:00",
"details": "Before applying this update, make sure all previously released errata relevant\nto your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11458",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:4215"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:1ec5bd4c50f080096a3579e498ac9301acf3927834f7773996911db8e11d2279_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:698a1ae2e5e2669d5a328d99deb4b8c67f2d7dd03d878600ce13f8dfb154fcf6_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:a4037bacb4f26a947e511da97519fe318b986e31ef4689a2ec7499789096dc2b_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/clair-rhel8@sha256:aad14ca0de55666d13c1a12511cea2c071d0a1c7c5e1b9ed9d7c70d157225293_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-bundle@sha256:c4133c994168c764a87f34a39a2fa66fa0c04c0c186781cf024e5e41f62280d0_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:1ff62272e3139cfc7abf3511e706bcdffeabfbbcacfee18508bd629cea20fd78_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:2f0c540c7269e27be3e0d4f988a4d19371a80b8b0684cff74d21851608636c88_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:aa1b44b1ee74a3ba6aa63eef2003077b1a9a5c067a6aa590eeb8fe30a93fe60b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-bridge-operator-rhel8@sha256:c33a90cf0b733a8fd0514f9c6cd53c22ff307c15b80c582736ab88ed26e967f7_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:0a79d63a51f959c7704662cf7370da2bd76cc22dd13acefe6eebe6b38881f98a_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:9e2fd6eb656ea932d83f001922aa46e7cef7796c404dbe7ab6393820149941a8_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:bec2f493457c5fec6af7309d9cc09c4a04632b9050b03720861cb05ac77d1d10_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-qemu-rhcos-rhel8@sha256:fd57da947aee5538acc22c9bbc537eeed955334f7bcce8683fe6eb325847812f_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:00c8d4e64fd7246b51a23807d56421a63c5cb201565e50fcdd70623d208b4c80_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:47b66c0f25e0be3b5e533422d5591baadc5f7653ec4c97d8398d6cc3451f5ed9_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:78d3fada736cdb40efb692c6eede03c9a380e3d44e3b4ca338bf3676e1c1b745_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-builder-rhel8@sha256:aea11bfd317b3c0d414f7c1ca5c7768ebbe2bf984d48f2960ec309463c383ced_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-bundle@sha256:a7f0bcbf21692be996d8beba4228d51d047237a3dad43a5d61e1a379742b5101_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:14d025b088b84df61332fd60382161cccfae6fc7310cdd7fd0a96432a1dcbb0b_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:191c87e2d307ccc97699cf0ff4b7217ca6d4c6fd51b01e93abc423b7b3b688ba_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:19afededc1a3f54a6c3d85c4e0e35043e1b0d2074f0d983e3393c4694348ae58_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-container-security-operator-rhel8@sha256:7a15aecd0b757726ec8dd1fc2d8d0e611fba1b77ce7857604bfa56314bc5189a_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-bundle@sha256:ef354fd2be18bcce59d2880843ad295ac8610c1d2dd1565a941ab18e77eec27e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:420be03e698e066bbaa96c7334e1a6b14793836f437b53ee1d961414115622c4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:6e421e848fac1ffd749e1761acd51d41419d73a55e610170e3c6c53294ec061e_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:7d3344ce19373fdf5cc721f0abbb2c2ee87d079b96d0dd4c7350621cfa57a322_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-operator-rhel8@sha256:91844fb97cac49e78054bd9547222aadf1762f1c0fd05feb0b86f9d94787512b_ppc64le",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:05cc4b4410de27e32897492effb21362d8c1bc8cc56e9408fc9a19f9f3149899_arm64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:225e2bed98b80e753ba2eca6b121a7295b20633b25b8098b7dce66efc2bc1b70_amd64",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:51881be0039c3a7df9ad588060955dc3f0ea6eef28a35ebc4fe146e73316e2a4_s390x",
"Red Hat Quay 3.14:registry.redhat.io/quay/quay-rhel8@sha256:e2a2347a1ed65e94a13fd0330e7922339096d725733071a1f9eb4c413be5eb90_ppc64le"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "wheel: wheel: Privilege Escalation or Arbitrary Code Execution via malicious wheel file unpacking"
}
]
}
RHSA-2025:15617
Vulnerability from csaf_redhat - Published: 2025-09-10 12:20 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for resource-agents is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15617",
"url": "https://access.redhat.com/errata/RHSA-2025:15617"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15617.json"
}
],
"title": "Red Hat Security Advisory: resource-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:08+00:00",
"generator": {
"date": "2026-03-10T16:03:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15617",
"initial_release_date": "2025-09-10T12:20:37+00:00",
"revision_history": [
{
"date": "2025-09-10T12:20:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-10T12:20:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::highavailability"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-16.el8_6.17.src",
"product": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.src",
"product_id": "resource-agents-0:4.9.0-16.el8_6.17.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-16.el8_6.17?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"product": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"product_id": "resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-16.el8_6.17?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"product": {
"name": "resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"product_id": "resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-16.el8_6.17?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"product_id": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-16.el8_6.17?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"product_id": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-16.el8_6.17?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"product": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"product_id": "resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-16.el8_6.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"product": {
"name": "resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"product_id": "resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun@4.9.0-16.el8_6.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"product": {
"name": "resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"product_id": "resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-gcp@4.9.0-16.el8_6.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"product": {
"name": "resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"product_id": "resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-16.el8_6.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"product_id": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-16.el8_6.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"product": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"product_id": "resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun-debuginfo@4.9.0-16.el8_6.17?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"product_id": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-16.el8_6.17?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.ppc64le"
},
"product_reference": "resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.src as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.src"
},
"product_reference": "resource-agents-0:4.9.0-16.el8_6.17.src",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le"
},
"product_reference": "resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability E4S (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.src as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.src"
},
"product_reference": "resource-agents-0:4.9.0-16.el8_6.17.src",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64 as a component of Red Hat Enterprise Linux High Availability TUS (v.8.6)",
"product_id": "HighAvailability-8.6.0.Z.TUS:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"relates_to_product_reference": "HighAvailability-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-10T12:20:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15617"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.E4S:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.ppc64le",
"HighAvailability-8.6.0.Z.E4S:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.src",
"HighAvailability-8.6.0.Z.TUS:resource-agents-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-aliyun-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debuginfo-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-debugsource-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-gcp-0:4.9.0-16.el8_6.17.x86_64",
"HighAvailability-8.6.0.Z.TUS:resource-agents-paf-0:4.9.0-16.el8_6.17.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
RHSA-2025:15618
Vulnerability from csaf_redhat - Published: 2025-09-10 12:20 - Updated: 2026-03-10 16:03A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for resource-agents is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.\n\nSecurity Fix(es):\n\n* requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15618",
"url": "https://access.redhat.com/errata/RHSA-2025:15618"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15618.json"
}
],
"title": "Red Hat Security Advisory: resource-agents security update",
"tracking": {
"current_release_date": "2026-03-10T16:03:10+00:00",
"generator": {
"date": "2026-03-10T16:03:10+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2025:15618",
"initial_release_date": "2025-09-10T12:20:42+00:00",
"revision_history": [
{
"date": "2025-09-10T12:20:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-10T12:20:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-10T16:03:10+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::highavailability"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.1.1-90.el8_4.20.src",
"product": {
"name": "resource-agents-0:4.1.1-90.el8_4.20.src",
"product_id": "resource-agents-0:4.1.1-90.el8_4.20.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.1.1-90.el8_4.20?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"product": {
"name": "resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"product_id": "resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.1.1-90.el8_4.20?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"product": {
"name": "resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"product_id": "resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun@4.1.1-90.el8_4.20?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"product": {
"name": "resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"product_id": "resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-gcp@4.1.1-90.el8_4.20?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"product": {
"name": "resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"product_id": "resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.1.1-90.el8_4.20?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"product": {
"name": "resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"product_id": "resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun-debuginfo@4.1.1-90.el8_4.20?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"product": {
"name": "resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"product_id": "resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.1.1-90.el8_4.20?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.1.1-90.el8_4.20.src as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.src"
},
"product_reference": "resource-agents-0:4.1.1-90.el8_4.20.src",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux High Availability AUS (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.AUS:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.1.1-90.el8_4.20.src as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.src"
},
"product_reference": "resource-agents-0:4.1.1-90.el8_4.20.src",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64 as a component of Red Hat Enterprise Linux HighAvailability EUS EXTENSION (v.8.4)",
"product_id": "HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"relates_to_product_reference": "HighAvailability-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"discovery_date": "2025-06-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2371272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Requests HTTP library. This vulnerability allows leakage of .netrc credentials to third parties via maliciously crafted URLs that exploit a URL parsing issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "RHBZ#2371272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2371272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"category": "external",
"summary": "http://seclists.org/fulldisclosure/2025/Jun/2",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/11",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/03/9",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/1",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"category": "external",
"summary": "http://www.openwall.com/lists/oss-security/2025/06/04/6",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/pull/6965",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"category": "external",
"summary": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"category": "external",
"summary": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"category": "external",
"summary": "https://seclists.org/fulldisclosure/2025/Jun/2",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
}
],
"release_date": "2025-06-09T17:57:47.731000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-10T12:20:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15618"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.AUS:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.AUS:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.src",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-aliyun-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debuginfo-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-debugsource-0:4.1.1-90.el8_4.20.x86_64",
"HighAvailability-8.4.0.Z.EUS.EXTENSION:resource-agents-gcp-0:4.1.1-90.el8_4.20.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "requests: Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
MSRC_CVE-2024-47081
Vulnerability from csaf_microsoft - Published: 2025-06-02 00:00 - Updated: 2026-02-18 14:41| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47081 Requests vulnerable to .netrc credentials leak via malicious URLs - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2024-47081.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Requests vulnerable to .netrc credentials leak via malicious URLs",
"tracking": {
"current_release_date": "2026-02-18T14:41:59.000Z",
"generator": {
"date": "2026-02-21T04:08:22.928Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-47081",
"initial_release_date": "2025-06-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-07-11T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-18T14:41:59.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 python-requests 2.31.0-3",
"product": {
"name": "\u003cazl3 python-requests 2.31.0-3",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 python-requests 2.31.0-3",
"product": {
"name": "azl3 python-requests 2.31.0-3",
"product_id": "19530"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 python-requests 2.27.1-8",
"product": {
"name": "\u003ccbl2 python-requests 2.27.1-8",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 python-requests 2.27.1-8",
"product": {
"name": "cbl2 python-requests 2.27.1-8",
"product_id": "20231"
}
},
{
"category": "product_version_range",
"name": "\u003ccm2 python-requests 2.27.1-8",
"product": {
"name": "\u003ccm2 python-requests 2.27.1-8",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cm2 python-requests 2.27.1-8",
"product": {
"name": "cm2 python-requests 2.27.1-8",
"product_id": "19539"
}
}
],
"category": "product_name",
"name": "python-requests"
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "5"
}
},
{
"category": "product_name",
"name": "cbl2 python-virtualenv 20.26.6-1",
"product": {
"name": "cbl2 python-virtualenv 20.26.6-1",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "cbl2 python-virtualenv 20.26.6-1",
"product": {
"name": "cbl2 python-virtualenv 20.26.6-1",
"product_id": "6"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-requests 2.31.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-requests 2.31.0-3 as a component of Azure Linux 3.0",
"product_id": "19530-17084"
},
"product_reference": "19530",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python-requests 2.27.1-8 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-requests 2.27.1-8 as a component of CBL Mariner 2.0",
"product_id": "20231-17086"
},
"product_reference": "20231",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-virtualenv 20.26.6-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-virtualenv 20.26.6-1 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm2 python-requests 2.27.1-8 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm2 python-requests 2.27.1-8 as a component of CBL Mariner 2.0",
"product_id": "19539-17086"
},
"product_reference": "19539",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-5",
"17086-2",
"17086-6"
]
}
],
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19530-17084",
"20231-17086",
"19539-17086"
],
"known_affected": [
"17084-4",
"17086-1",
"17086-3"
],
"known_not_affected": [
"17084-5",
"17086-2",
"17086-6"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47081 Requests vulnerable to .netrc credentials leak via malicious URLs - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2024-47081.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-11T00:00:00.000Z",
"details": "2.31.0-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-07-11T00:00:00.000Z",
"details": "2.27.1-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1",
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"17084-4",
"17086-1",
"17086-3"
]
}
],
"title": "Requests vulnerable to .netrc credentials leak via malicious URLs"
}
]
}
GHSA-9HJG-9R4M-MVJ7
Vulnerability from github – Published: 2025-06-09 19:06 – Updated: 2025-06-09 19:06Impact
Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.
Workarounds
For older versions of Requests, use of the .netrc file can be disabled with trust_env=False on your Requests Session (docs).
References
https://github.com/psf/requests/pull/6965 https://seclists.org/fulldisclosure/2025/Jun/2
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "requests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.32.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-47081"
],
"database_specific": {
"cwe_ids": [
"CWE-522"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-09T19:06:08Z",
"nvd_published_at": "2025-06-09T18:15:24Z",
"severity": "MODERATE"
},
"details": "### Impact\n\nDue to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs.\n\n### Workarounds\nFor older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on your Requests Session ([docs](https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env)).\n\n### References\nhttps://github.com/psf/requests/pull/6965\nhttps://seclists.org/fulldisclosure/2025/Jun/2",
"id": "GHSA-9hjg-9r4m-mvj7",
"modified": "2025-06-09T19:06:08Z",
"published": "2025-06-09T19:06:08Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47081"
},
{
"type": "WEB",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"type": "WEB",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"type": "PACKAGE",
"url": "https://github.com/psf/requests"
},
{
"type": "WEB",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"type": "WEB",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "Requests vulnerable to .netrc credentials leak via malicious URLs"
}
alsa-2025:13604
Vulnerability from osv_almalinux
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
- requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "python3-requests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.32.4-1.el10_0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. \n\nSecurity Fix(es): \n\n * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:13604",
"modified": "2025-08-11T19:21:12Z",
"published": "2025-08-11T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:13604"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2371272"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2025-13604.html"
}
],
"related": [
"CVE-2024-47081"
],
"summary": "Moderate: python-requests security update"
}
alsa-2025:14750
Vulnerability from osv_almalinux
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
- requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-all"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-amt-ws"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-apc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-apc-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-bladecenter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-brocade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-cisco-mds"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-cisco-ucs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-compute"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-drac5"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-eaton-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-emerson"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-eps"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-heuristics-ping"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-hpblade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ibm-powervs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ibm-vpc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ibmblade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ifmib"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo-moonshot"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo-mp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo-ssh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-intelmodular"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ipdu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ipmilan"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-kdump"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-kubevirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-lpar"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-mpath"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-redfish"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-rhevm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-rsa"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-rsb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-sbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-scsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-virsh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-vmware-rest"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-vmware-soap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-wti"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-zvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8_10.14"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es): \n\n * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:14750",
"modified": "2025-08-28T07:14:58Z",
"published": "2025-08-27T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:14750"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2371272"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-14750.html"
}
],
"related": [
"CVE-2024-47081"
],
"summary": "Moderate: fence-agents security update"
}
alsa-2025:14999
Vulnerability from osv_almalinux
The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.
Security Fix(es):
- requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8_10.16"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents-aliyun"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8_10.16"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents-gcp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8_10.16"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents-paf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8_10.16"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment. \n\nSecurity Fix(es): \n\n * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:14999",
"modified": "2026-01-05T21:07:54Z",
"published": "2025-09-02T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:14999"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2371272"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-14999.html"
}
],
"related": [
"CVE-2024-47081"
],
"summary": "Moderate: resource-agents security update"
}
alsa-2025:12519
Vulnerability from osv_almalinux
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
- requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-requests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.25.1-10.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-requests+security"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.25.1-10.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-requests+socks"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.25.1-10.el9_6"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. \n\nSecurity Fix(es): \n\n * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:12519",
"modified": "2025-08-04T12:47:36Z",
"published": "2025-08-04T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:12519"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2371272"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2025-12519.html"
}
],
"related": [
"CVE-2024-47081"
],
"summary": "Moderate: python-requests security update"
}
alsa-2025:13234
Vulnerability from osv_almalinux
Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
- requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-requests"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.20.0-6.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. \n\nSecurity Fix(es): \n\n * requests: Requests vulnerable to .netrc credentials leak via malicious URLs (CVE-2024-47081)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2025:13234",
"modified": "2025-08-06T15:03:44Z",
"published": "2025-08-06T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2025:13234"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2371272"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2025-13234.html"
}
],
"related": [
"CVE-2024-47081"
],
"summary": "Moderate: python-requests security update"
}
FKIE_CVE-2024-47081
Vulnerability from fkie_nvd - Published: 2025-06-09 18:15 - Updated: 2025-06-12 16:06| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef | ||
| security-advisories@github.com | https://github.com/psf/requests/pull/6965 | ||
| security-advisories@github.com | https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7 | ||
| security-advisories@github.com | https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env | ||
| security-advisories@github.com | https://seclists.org/fulldisclosure/2025/Jun/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2025/Jun/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/03/11 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/03/9 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/04/1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2025/06/04/6 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session."
},
{
"lang": "es",
"value": "Requests es una librer\u00eda HTTP. Debido a un problema de an\u00e1lisis de URL, las versiones de Requests anteriores a la 2.32.4 pueden filtrar credenciales .netrc a terceros para URL espec\u00edficas manipuladas con fines maliciosos. Los usuarios deben actualizar a la versi\u00f3n 2.32.4 para obtener una soluci\u00f3n. En versiones anteriores de Requests, el uso del archivo .netrc se puede desactivar con `trust_env=False` en la sesi\u00f3n de Requests."
}
],
"id": "CVE-2024-47081",
"lastModified": "2025-06-12T16:06:47.857",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-06-09T18:15:24.983",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/psf/requests/pull/6965"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7"
},
{
"source": "security-advisories@github.com",
"url": "https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env"
},
{
"source": "security-advisories@github.com",
"url": "https://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://seclists.org/fulldisclosure/2025/Jun/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/03/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2025/06/04/6"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-522"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0651
Vulnerability from certfr_avis - Published: 2025-08-01 - Updated: 2025-08-01
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 14.10.x sans le dernier correctif de sécurité | ||
| IBM | Db2 | Db2 versions 12.1.x antérieures à 12.1.2 | ||
| IBM | QRadar | QRadar Investigation Assistant versions 1.x antérieures à 1.1.0 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 12.10.x sans le dernier correctif de sécurité | ||
| IBM | Cognos Analytics | Cognos Analytics 12.1.x antérieures à 12.1.0 IF2 | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité PH67120 et PH67183 | ||
| IBM | Db2 | Db2 versions 11.1.x antérieures à 11.1.4 FP7 sans le dernier correctif de sécurité temporaire | ||
| IBM | Tivoli | Tivoli System Automation Application Manager 4.1 sans le correctif de sécurité pour WebSphere Application Server 9.0 | ||
| IBM | Cognos Analytics | Cognos Analytics 11.2.x antérieures à 11.2.4 FP6 | ||
| IBM | Db2 | Db2 versions 11.5.x antérieures à 11.5.9 sans le dernier correctif de sécurité temporaire | ||
| IBM | Cognos Analytics | Cognos Analytics 12.0.x antérieures à 12.0.4 FP1 | ||
| IBM | Db2 | Db2 versions 10.5.x antérieures à 10.5 FP11 sans le dernier correctif de sécurité temporaire |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Informix Dynamic Server versions 14.10.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 12.1.x ant\u00e9rieures \u00e0 12.1.2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Investigation Assistant versions 1.x ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 12.10.x sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics\t12.1.x ant\u00e9rieures \u00e0 12.1.0 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 PH67120 et PH67183",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.1.x ant\u00e9rieures \u00e0 11.1.4 FP7 sans le dernier correctif de s\u00e9curit\u00e9 temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Tivoli System Automation Application Manager 4.1 sans le correctif de s\u00e9curit\u00e9 pour WebSphere Application Server 9.0",
"product": {
"name": "Tivoli",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics\t11.2.x ant\u00e9rieures \u00e0 11.2.4 FP6",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.5.x ant\u00e9rieures \u00e0 11.5.9 sans le dernier correctif de s\u00e9curit\u00e9 temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics\t12.0.x ant\u00e9rieures \u00e0 12.0.4 FP1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 10.5.x ant\u00e9rieures \u00e0 10.5 FP11 sans le dernier correctif de s\u00e9curit\u00e9 temporaire",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49342"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-30472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49343"
},
{
"name": "CVE-2025-47278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47278"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-27607",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27607"
},
{
"name": "CVE-2025-48387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48387"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
}
],
"initial_release_date": "2025-08-01T00:00:00",
"last_revision_date": "2025-08-01T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0651",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-01T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240941",
"url": "https://www.ibm.com/support/pages/node/7240941"
},
{
"published_at": "2025-07-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240649",
"url": "https://www.ibm.com/support/pages/node/7240649"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240898",
"url": "https://www.ibm.com/support/pages/node/7240898"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240775",
"url": "https://www.ibm.com/support/pages/node/7240775"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240798",
"url": "https://www.ibm.com/support/pages/node/7240798"
},
{
"published_at": "2025-07-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239462",
"url": "https://www.ibm.com/support/pages/node/7239462"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240952",
"url": "https://www.ibm.com/support/pages/node/7240952"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240940",
"url": "https://www.ibm.com/support/pages/node/7240940"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240946",
"url": "https://www.ibm.com/support/pages/node/7240946"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240777",
"url": "https://www.ibm.com/support/pages/node/7240777"
},
{
"published_at": "2025-07-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240899",
"url": "https://www.ibm.com/support/pages/node/7240899"
},
{
"published_at": "2025-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7240977",
"url": "https://www.ibm.com/support/pages/node/7240977"
}
]
}
CERTFR-2026-AVI-0118
Vulnerability from certfr_avis - Published: 2026-02-05 - Updated: 2026-02-05
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk SOAR versions ant\u00e9rieures \u00e0 7.1.0",
"product": {
"name": "SOAR",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-32873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32873"
},
{
"name": "CVE-2025-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9287"
},
{
"name": "CVE-2025-57810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57810"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
}
],
"initial_release_date": "2026-02-05T00:00:00",
"last_revision_date": "2026-02-05T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0118",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2026-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0201",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0201"
}
]
}
CERTFR-2025-AVI-0947
Vulnerability from certfr_avis - Published: 2025-10-31 - Updated: 2025-10-31
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.9.iFix005 pour Unix | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.4.x antérieures à 6.4.0.2.iFix004 pour Unix | ||
| IBM | QRadar | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP14 | ||
| IBM | QRadar Hub | Qradar Hub versions antérieures à 3.9.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5.iFix008 pour Unix | ||
| IBM | QRadar | QRadar Incident Forensics versions 7.5.x antérieures à 7.5.0 UP14 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.9.iFix005 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.2.iFix004 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Qradar Hub versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar Hub",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5.iFix008 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-54389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54389"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2022-26336",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26336"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2023-45145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45145"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36007"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2024-21096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21096"
},
{
"name": "CVE-2019-10130",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10130"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36137"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2017-7484",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7484"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
}
],
"initial_release_date": "2025-10-31T00:00:00",
"last_revision_date": "2025-10-31T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0947",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-31T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-10-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249678",
"url": "https://www.ibm.com/support/pages/node/7249678"
},
{
"published_at": "2025-10-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249277",
"url": "https://www.ibm.com/support/pages/node/7249277"
},
{
"published_at": "2025-10-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249661",
"url": "https://www.ibm.com/support/pages/node/7249661"
},
{
"published_at": "2025-10-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7249276",
"url": "https://www.ibm.com/support/pages/node/7249276"
}
]
}
CERTFR-2025-AVI-0724
Vulnerability from certfr_avis - Published: 2025-08-22 - Updated: 2025-08-22
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | QRadar Incident Forensics versions 7.5.x antérieures à QIF 7.5.0 UP13 IF01 | ||
| IBM | WebSphere Service Registry and Repository | WebSphere Service Registry and Repository versions 8.5 sans les derniers correctifs de sécurité | ||
| IBM | Sterling B2B Integrator | Sterling B2B Integrator versions 6.x antérieures à 6.2.1.1 | ||
| IBM | QRadar | QRadar Data Synchronization App versions antérieures à 3.2.2 | ||
| IBM | QRadar Log Source Management App | QRadar Log Source Management App versions antérieures à 7.0.12 | ||
| IBM | Sterling File Gateway | Sterling File Gateway versions 6.x antérieures à 6.2.1.1 | ||
| IBM | QRadar SIEM | QRadar SIEM QRadar versions 7.5.x antérieures à 7.5.0 UP13 IF01 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.6.2 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 QIF 7.5.0 UP13 IF01",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Service Registry and Repository versions 8.5 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere Service Registry and Repository",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator versions 6.x ant\u00e9rieures \u00e0 6.2.1.1",
"product": {
"name": "Sterling B2B Integrator",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Data Synchronization App versions ant\u00e9rieures \u00e0 3.2.2",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Log Source Management App versions ant\u00e9rieures \u00e0 7.0.12",
"product": {
"name": "QRadar Log Source Management App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling File Gateway versions 6.x ant\u00e9rieures \u00e0 6.2.1.1",
"product": {
"name": "Sterling File Gateway",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM QRadar versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP13 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.6.2",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-32996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32996"
},
{
"name": "CVE-2025-36042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36042"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-48050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
},
{
"name": "CVE-2025-22150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22150"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2025-6545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6545"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2018-14732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14732"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-32997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32997"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-30360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30360"
},
{
"name": "CVE-2025-33120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33120"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-30359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30359"
},
{
"name": "CVE-2025-6547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6547"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
}
],
"initial_release_date": "2025-08-22T00:00:00",
"last_revision_date": "2025-08-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0724",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242291",
"url": "https://www.ibm.com/support/pages/node/7242291"
},
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242269",
"url": "https://www.ibm.com/support/pages/node/7242269"
},
{
"published_at": "2025-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242292",
"url": "https://www.ibm.com/support/pages/node/7242292"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242246",
"url": "https://www.ibm.com/support/pages/node/7242246"
},
{
"published_at": "2025-08-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242869",
"url": "https://www.ibm.com/support/pages/node/7242869"
},
{
"published_at": "2025-08-20",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242665",
"url": "https://www.ibm.com/support/pages/node/7242665"
}
]
}
CERTFR-2025-AVI-0896
Vulnerability from certfr_avis - Published: 2025-10-17 - Updated: 2025-10-17
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.4.x antérieures à 6.4.0.4 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.11.5.0 | ||
| IBM | QRadar | QRadar Investigation Assistant versions antérieures à 1.2.0 | ||
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.1.x sans le correctif APAR PH68446 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions antérieures à 1.11.5.0 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions antérieures à 3.12.19 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.15 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.29 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling Connect:Direct Web Services versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.4",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.11.5.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Investigation Assistant versions ant\u00e9rieures \u00e0 1.2.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere eXtreme Scale versions 8.6.1.x sans le correctif APAR PH68446",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.11.5.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.19",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.15",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.29",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2025-46548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46548"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-32082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32082"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2019-9674",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9674"
},
{
"name": "CVE-2024-6866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6866"
},
{
"name": "CVE-2025-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2018-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8740"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-49826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49826"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-30474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30474"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2024-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21538"
},
{
"name": "CVE-2023-44389",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44389"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-6844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6844"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-22968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22968"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-27553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27553"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-47278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47278"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2025-1767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1767"
},
{
"name": "CVE-2025-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49005"
},
{
"name": "CVE-2025-30218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30218"
},
{
"name": "CVE-2023-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36479"
},
{
"name": "CVE-2022-31628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31628"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2024-7598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7598"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-46653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46653"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6839"
},
{
"name": "CVE-2025-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48997"
},
{
"name": "CVE-2025-48387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48387"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-7338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7338"
},
{
"name": "CVE-2024-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44906"
},
{
"name": "CVE-2025-59343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59343"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
}
],
"initial_release_date": "2025-10-17T00:00:00",
"last_revision_date": "2025-10-17T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0896",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-17T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7247985",
"url": "https://www.ibm.com/support/pages/node/7247985"
},
{
"published_at": "2025-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7247975",
"url": "https://www.ibm.com/support/pages/node/7247975"
},
{
"published_at": "2025-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7247893",
"url": "https://www.ibm.com/support/pages/node/7247893"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7248127",
"url": "https://www.ibm.com/support/pages/node/7248127"
},
{
"published_at": "2025-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7248118",
"url": "https://www.ibm.com/support/pages/node/7248118"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: 2025-09-05 - Updated: 2025-09-05
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0789
Vulnerability from certfr_avis - Published: 2025-09-12 - Updated: 2025-09-12
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP13 IF02 ",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar App SDK versions ant\u00e9rieures \u00e0 2.2.4",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Investigation Assistant versions ant\u00e9rieures \u00e0 1.1.1",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-38380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38380"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-6032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6032"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2021-47670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47670"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2024-56644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56644"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
}
],
"initial_release_date": "2025-09-12T00:00:00",
"last_revision_date": "2025-09-12T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0789",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-09-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244786",
"url": "https://www.ibm.com/support/pages/node/7244786"
},
{
"published_at": "2025-09-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244264",
"url": "https://www.ibm.com/support/pages/node/7244264"
},
{
"published_at": "2025-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244494",
"url": "https://www.ibm.com/support/pages/node/7244494"
}
]
}
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis - Published: 2025-07-11 - Updated: 2025-07-11
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2024-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7531"
},
{
"name": "CVE-2021-25317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25317"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2020-12413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12413"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2015-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1197"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2017-1000383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2025-52968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52968"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2023-7207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7207"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
}
],
"initial_release_date": "2025-07-11T00:00:00",
"last_revision_date": "2025-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35935",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35934",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35931",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931"
}
]
}
CERTFR-2026-AVI-0281
Vulnerability from certfr_avis - Published: 2026-03-12 - Updated: 2026-03-12
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk AppDynamics Private Synthetic Agent | Splunk AppDynamics Private Synthetic Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk AppDynamics On-Premises Enterprise Console | Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x antérieures à 26.1.1 | ||
| Splunk | Splunk AppDynamics Database Agent | Splunk AppDynamics Database Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.0.2503 antérieures à 10.0.2503.12 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.124 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.9 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.2.x antérieures à 10.2.1 | ||
| Splunk | Splunk AppDynamics NodeJS Agent | Splunk AppDynamics NodeJS Agent versions 25.12.x antérieures à 25.12.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.10 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.1.2507 antérieures à 10.1.2507.17 | ||
| Splunk | Splunk AppDynamics Java Agent | Splunk AppDynamics Java Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.2.2510 antérieures à 10.2.2510.7 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk AppDynamics Private Synthetic Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Private Synthetic Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x ant\u00e9rieures \u00e0 26.1.1",
"product": {
"name": "Splunk AppDynamics On-Premises Enterprise Console",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Database Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Database Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.0.2503 ant\u00e9rieures \u00e0 10.0.2503.12",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.124",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.9",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.2.x ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics NodeJS Agent versions 25.12.x ant\u00e9rieures \u00e0 25.12.1",
"product": {
"name": "Splunk AppDynamics NodeJS Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.1.2507 ant\u00e9rieures \u00e0 10.1.2507.17",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Java Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Java Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.2.2510 ant\u00e9rieures \u00e0 10.2.2510.7",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2018-16864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16864"
},
{
"name": "CVE-2025-48073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48073"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-11219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11219"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1594"
},
{
"name": "CVE-2025-3887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3887"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-4574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4574"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12433"
},
{
"name": "CVE-2025-12444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12444"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2025-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11213"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-12036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12036"
},
{
"name": "CVE-2012-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0871"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-0518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0518"
},
{
"name": "CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-12438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12438"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2025-12435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12435"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2013-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4394"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2025-64183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64183"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-47808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47808"
},
{
"name": "CVE-2021-46877",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46877"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2017-18078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18078"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2025-11207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11207"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-13223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13223"
},
{
"name": "CVE-2025-12431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12431"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2024-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7246"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2025-12726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12726"
},
{
"name": "CVE-2025-12445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12445"
},
{
"name": "CVE-2025-12437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12437"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2025-69230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69230"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-0716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0716"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-12434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12434"
},
{
"name": "CVE-2025-69225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69225"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-12439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12439"
},
{
"name": "CVE-2018-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16865"
},
{
"name": "CVE-2025-14874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14874"
},
{
"name": "CVE-2020-17521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17521"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2025-48072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48072"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-12432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12432"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2026-20165",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20165"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-22919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22919"
},
{
"name": "CVE-2024-23672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
},
{
"name": "CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-12443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12443"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-6602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6602"
},
{
"name": "CVE-2025-11215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11215"
},
{
"name": "CVE-2013-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4393"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2025-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11205"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-12725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12725"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2025-11208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11208"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-8372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8372"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11756"
},
{
"name": "CVE-2025-59730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59730"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2025-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13033"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11212"
},
{
"name": "CVE-2025-12495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12495"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-12840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12840"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-11458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11458"
},
{
"name": "CVE-2020-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12429"
},
{
"name": "CVE-2026-20164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20164"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-11211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11211"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2023-26118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26118"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"name": "CVE-2025-59250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59250"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-47807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47807"
},
{
"name": "CVE-2025-47806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47806"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-64182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64182"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2023-6604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6604"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2017-9217",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9217"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-64181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64181"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-12436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12436"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2013-4327",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4327"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-12446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12446"
},
{
"name": "CVE-2025-13228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13228"
},
{
"name": "CVE-2013-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4391"
},
{
"name": "CVE-2026-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20166"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-12441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12441"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2025-47183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47183"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6601"
},
{
"name": "CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-69226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69226"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13224"
},
{
"name": "CVE-2025-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13042"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2025-11460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11460"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-13229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13229"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2025-12440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12440"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-11216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11216"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2018-1049",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1049"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-11210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11210"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2022-31159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
},
{
"name": "CVE-2025-12729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12729"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2025-10256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10256"
},
{
"name": "CVE-2026-20162",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20162"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-12839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12839"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2019-3844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3844"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-12728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12728"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2023-6605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6605"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2025-12430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12430"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-11206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11206"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9951"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-59729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59729"
},
{
"name": "CVE-2025-48071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48071"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2025-69224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69224"
},
{
"name": "CVE-2025-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2759"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-30153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30153"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-69229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69229"
},
{
"name": "CVE-2024-8373",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8373"
},
{
"name": "CVE-2025-11209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11209"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2024-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21490"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-49501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49501"
},
{
"name": "CVE-2019-3843",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3843"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2026-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26981"
},
{
"name": "CVE-2025-12447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12447"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2013-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4392"
},
{
"name": "CVE-2025-48074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48074"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2016-7795",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7795"
},
{
"name": "CVE-2025-12727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12727"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-12428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12428"
},
{
"name": "CVE-2026-20163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20163"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-12T00:00:00",
"last_revision_date": "2026-03-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0281",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0302",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0302"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0311",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0311"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0308",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0308"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0309",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0309"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0305",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0305"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0310",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0310"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0304",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0304"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0301",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0301"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0313",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0313"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0306",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0306"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0303",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0303"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0307",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0307"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0312",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0312"
}
]
}
CERTFR-2025-AVI-1036
Vulnerability from certfr_avis - Published: 2025-11-24 - Updated: 2025-11-24
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | App Metrics versions antérieures à 2.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.954.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.126.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Platform Services | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.22 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Metric Store versions antérieures à 1.8.1 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | AI Services pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu | VMware Tanzu pour Postgres on Tanzu Platform versions antérieures à 10.2.1 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.954.x | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.92.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.1 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.954.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "App Metrics versions ant\u00e9rieures \u00e0 2.3.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.126.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Platform Services",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.22",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Metric Store versions ant\u00e9rieures \u00e0 1.8.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "AI Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Postgres on Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.92.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.954.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-13425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13425"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-64329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64329"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-59530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59530"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-40300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40300"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-25621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25621"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5981"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-24T00:00:00",
"last_revision_date": "2025-11-24T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1036",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36513",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36513"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36530",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36530"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36512",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36512"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36526",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36526"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36511",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36511"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36525",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36525"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36516",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36516"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36527",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36527"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36536",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36536"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36519",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36519"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36518",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36518"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36524",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36524"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36521",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36521"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36528",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36528"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36522",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36522"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36514",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36514"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36532",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36532"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36509",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36509"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36517",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36517"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36533",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36533"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36537",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36537"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36531",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36531"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36510",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36510"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36523",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36523"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36515",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36515"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36529",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36529"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36534",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36534"
},
{
"published_at": "2025-11-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36535",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36535"
},
{
"published_at": "2025-11-23",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36520",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36520"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis - Published: 2025-07-25 - Updated: 2025-07-25
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
}
],
"initial_release_date": "2025-07-25T00:00:00",
"last_revision_date": "2025-07-25T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
SUSE-SU-2025:02205-1
Vulnerability from csaf_suse - Published: 2025-07-02 15:15 - Updated: 2025-07-02 15:15| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-requests",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-requests fixes the following issues:\n\n- CVE-2024-47081: fixes netrc credential leak (bsc#1244039).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2205,SUSE-SLE-Module-Public-Cloud-15-SP4-2025-2205,SUSE-SLE-Module-Python3-15-SP6-2025-2205,SUSE-SLE-Module-Python3-15-SP7-2025-2205,openSUSE-SLE-15.6-2025-2205",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02205-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02205-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502205-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02205-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040591.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244039",
"url": "https://bugzilla.suse.com/1244039"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "Security update for python-requests",
"tracking": {
"current_release_date": "2025-07-02T15:15:15Z",
"generator": {
"date": "2025-07-02T15:15:15Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02205-1",
"initial_release_date": "2025-07-02T15:15:15Z",
"revision_history": [
{
"date": "2025-07-02T15:15:15Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-requests-2.31.0-150400.6.18.1.noarch",
"product": {
"name": "python311-requests-2.31.0-150400.6.18.1.noarch",
"product_id": "python311-requests-2.31.0-150400.6.18.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.31.0-150400.6.18.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-requests-2.31.0-150400.6.18.1.noarch"
},
"product_reference": "python311-requests-2.31.0-150400.6.18.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.31.0-150400.6.18.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP6:python311-requests-2.31.0-150400.6.18.1.noarch"
},
"product_reference": "python311-requests-2.31.0-150400.6.18.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.31.0-150400.6.18.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-requests-2.31.0-150400.6.18.1.noarch"
},
"product_reference": "python311-requests-2.31.0-150400.6.18.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.31.0-150400.6.18.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:python311-requests-2.31.0-150400.6.18.1.noarch"
},
"product_reference": "python311-requests-2.31.0-150400.6.18.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-requests-2.31.0-150400.6.18.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-requests-2.31.0-150400.6.18.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-requests-2.31.0-150400.6.18.1.noarch",
"openSUSE Leap 15.6:python311-requests-2.31.0-150400.6.18.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-requests-2.31.0-150400.6.18.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-requests-2.31.0-150400.6.18.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-requests-2.31.0-150400.6.18.1.noarch",
"openSUSE Leap 15.6:python311-requests-2.31.0-150400.6.18.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP4:python311-requests-2.31.0-150400.6.18.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP6:python311-requests-2.31.0-150400.6.18.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-requests-2.31.0-150400.6.18.1.noarch",
"openSUSE Leap 15.6:python311-requests-2.31.0-150400.6.18.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-02T15:15:15Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
SUSE-SU-2025:20531-1
Vulnerability from csaf_suse - Published: 2025-07-24 11:31 - Updated: 2025-07-24 11:31| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-requests",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-requests fixes the following issues:\n\n- Avoid problems with certificate caching in sslcontext.\n (bsc#1246104, gh#psf/requests#6767)\n\nUpdate to 2.32.4:\n\n * CVE-2024-47081 Fixed an issue where a maliciously crafted URL\n and trusted environment will retrieve credentials for the wrong\n hostname/machine from a netrc file (gh#psf/requests#6965, bsc#1244039)\n * Numerous documentation improvements\n * Added support for pypy 3.11 for Linux and macOS.\n * Dropped support for pypy 3.9 following its end of support.\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-189",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20531-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20531-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520531-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20531-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041123.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244039",
"url": "https://bugzilla.suse.com/1244039"
},
{
"category": "self",
"summary": "SUSE Bug 1246104",
"url": "https://bugzilla.suse.com/1246104"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "Security update for python-requests",
"tracking": {
"current_release_date": "2025-07-24T11:31:36Z",
"generator": {
"date": "2025-07-24T11:31:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20531-1",
"initial_release_date": "2025-07-24T11:31:36Z",
"revision_history": [
{
"date": "2025-07-24T11:31:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-requests-2.32.4-slfo.1.1_1.1.noarch",
"product": {
"name": "python311-requests-2.32.4-slfo.1.1_1.1.noarch",
"product_id": "python311-requests-2.32.4-slfo.1.1_1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.32.4-slfo.1.1_1.1.noarch as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:python311-requests-2.32.4-slfo.1.1_1.1.noarch"
},
"product_reference": "python311-requests-2.32.4-slfo.1.1_1.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:python311-requests-2.32.4-slfo.1.1_1.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:python311-requests-2.32.4-slfo.1.1_1.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:python311-requests-2.32.4-slfo.1.1_1.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-24T11:31:36Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
SUSE-SU-2025:01999-1
Vulnerability from csaf_suse - Published: 2025-06-18 08:43 - Updated: 2025-06-18 08:43| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-requests",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-requests fixes the following issues:\n\n- CVE-2024-47081: fixed netrc credential leak (bsc#1244039).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-1999,SUSE-SLE-Module-Public-Cloud-12-2025-1999,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1999",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01999-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:01999-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501999-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:01999-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040361.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244039",
"url": "https://bugzilla.suse.com/1244039"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "Security update for python-requests",
"tracking": {
"current_release_date": "2025-06-18T08:43:00Z",
"generator": {
"date": "2025-06-18T08:43:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:01999-1",
"initial_release_date": "2025-06-18T08:43:00Z",
"revision_history": [
{
"date": "2025-06-18T08:43:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-requests-2.24.0-8.23.1.noarch",
"product": {
"name": "python-requests-2.24.0-8.23.1.noarch",
"product_id": "python-requests-2.24.0-8.23.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-requests-2.24.0-8.23.1.noarch",
"product": {
"name": "python3-requests-2.24.0-8.23.1.noarch",
"product_id": "python3-requests-2.24.0-8.23.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-2.24.0-8.23.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-requests-2.24.0-8.23.1.noarch"
},
"product_reference": "python-requests-2.24.0-8.23.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.24.0-8.23.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-requests-2.24.0-8.23.1.noarch"
},
"product_reference": "python3-requests-2.24.0-8.23.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-2.24.0-8.23.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-requests-2.24.0-8.23.1.noarch"
},
"product_reference": "python-requests-2.24.0-8.23.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-requests-2.24.0-8.23.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-requests-2.24.0-8.23.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-requests-2.24.0-8.23.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-requests-2.24.0-8.23.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-requests-2.24.0-8.23.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-requests-2.24.0-8.23.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-requests-2.24.0-8.23.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-requests-2.24.0-8.23.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-requests-2.24.0-8.23.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-18T08:43:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
SUSE-SU-2025:20455-1
Vulnerability from csaf_suse - Published: 2025-06-30 12:29 - Updated: 2025-06-30 12:29| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-requests",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-requests fixes the following issues:\n\n- CVE-2024-47081: Fixed incorrect URL processing leading to .netrc credential leak (bsc#1244039)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-371",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20455-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20455-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520455-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20455-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040618.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244039",
"url": "https://bugzilla.suse.com/1244039"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "Security update for python-requests",
"tracking": {
"current_release_date": "2025-06-30T12:29:07Z",
"generator": {
"date": "2025-06-30T12:29:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20455-1",
"initial_release_date": "2025-06-30T12:29:07Z",
"revision_history": [
{
"date": "2025-06-30T12:29:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-requests-2.32.3-2.1.noarch",
"product": {
"name": "python311-requests-2.32.3-2.1.noarch",
"product_id": "python311-requests-2.32.3-2.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.32.3-2.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:python311-requests-2.32.3-2.1.noarch"
},
"product_reference": "python311-requests-2.32.3-2.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:python311-requests-2.32.3-2.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:python311-requests-2.32.3-2.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:python311-requests-2.32.3-2.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-30T12:29:07Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
SUSE-SU-2025:01997-1
Vulnerability from csaf_suse - Published: 2025-06-18 08:41 - Updated: 2025-06-18 08:41| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python3-requests",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python3-requests fixes the following issues:\n\n- CVE-2024-47081: fixes netrc credential leak (bsc#1244039).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-1997,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1997",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01997-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:01997-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501997-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:01997-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040363.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244039",
"url": "https://bugzilla.suse.com/1244039"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "Security update for python3-requests",
"tracking": {
"current_release_date": "2025-06-18T08:41:18Z",
"generator": {
"date": "2025-06-18T08:41:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:01997-1",
"initial_release_date": "2025-06-18T08:41:18Z",
"revision_history": [
{
"date": "2025-06-18T08:41:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python3-requests-2.24.0-8.20.1.noarch",
"product": {
"name": "python3-requests-2.24.0-8.20.1.noarch",
"product_id": "python3-requests-2.24.0-8.20.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.24.0-8.20.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python3-requests-2.24.0-8.20.1.noarch"
},
"product_reference": "python3-requests-2.24.0-8.20.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python3-requests-2.24.0-8.20.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python3-requests-2.24.0-8.20.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python3-requests-2.24.0-8.20.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-18T08:41:18Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
SUSE-SU-2025:02371-1
Vulnerability from csaf_suse - Published: 2025-07-18 12:42 - Updated: 2025-07-18 12:42| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-requests",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-requests fixes the following issues:\n\n- CVE-2024-47081: fixed netrc credential leak (bsc#1244039).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2371,SUSE-SLE-Manager-Tools-12-2025-2371",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02371-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02371-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502371-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02371-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040779.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244039",
"url": "https://bugzilla.suse.com/1244039"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "Security update for python-requests",
"tracking": {
"current_release_date": "2025-07-18T12:42:43Z",
"generator": {
"date": "2025-07-18T12:42:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02371-1",
"initial_release_date": "2025-07-18T12:42:43Z",
"revision_history": [
{
"date": "2025-07-18T12:42:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-requests-2.11.1-6.43.1.noarch",
"product": {
"name": "python-requests-2.11.1-6.43.1.noarch",
"product_id": "python-requests-2.11.1-6.43.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-requests-2.11.1-6.43.1.noarch",
"product": {
"name": "python3-requests-2.11.1-6.43.1.noarch",
"product_id": "python3-requests-2.11.1-6.43.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Manager Client Tools 12",
"product": {
"name": "SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-requests-2.11.1-6.43.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python-requests-2.11.1-6.43.1.noarch"
},
"product_reference": "python-requests-2.11.1-6.43.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.11.1-6.43.1.noarch as component of SUSE Manager Client Tools 12",
"product_id": "SUSE Manager Client Tools 12:python3-requests-2.11.1-6.43.1.noarch"
},
"product_reference": "python3-requests-2.11.1-6.43.1.noarch",
"relates_to_product_reference": "SUSE Manager Client Tools 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Manager Client Tools 12:python-requests-2.11.1-6.43.1.noarch",
"SUSE Manager Client Tools 12:python3-requests-2.11.1-6.43.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Manager Client Tools 12:python-requests-2.11.1-6.43.1.noarch",
"SUSE Manager Client Tools 12:python3-requests-2.11.1-6.43.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Manager Client Tools 12:python-requests-2.11.1-6.43.1.noarch",
"SUSE Manager Client Tools 12:python3-requests-2.11.1-6.43.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-18T12:42:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
SUSE-SU-2025:01998-1
Vulnerability from csaf_suse - Published: 2025-06-18 08:42 - Updated: 2025-06-18 08:42| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-requests",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-requests fixes the following issues:\n\n- CVE-2024-47081: fixed netrc credential leak (bsc#1244039).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-1998,SUSE-SLE-Micro-5.3-2025-1998,SUSE-SLE-Micro-5.4-2025-1998,SUSE-SLE-Micro-5.5-2025-1998,SUSE-SLE-Module-Basesystem-15-SP6-2025-1998,SUSE-SLE-Module-Basesystem-15-SP7-2025-1998,SUSE-SUSE-MicroOS-5.1-2025-1998,SUSE-SUSE-MicroOS-5.2-2025-1998",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01998-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:01998-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501998-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:01998-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040362.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244039",
"url": "https://bugzilla.suse.com/1244039"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "Security update for python-requests",
"tracking": {
"current_release_date": "2025-06-18T08:42:28Z",
"generator": {
"date": "2025-06-18T08:42:28Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:01998-1",
"initial_release_date": "2025-06-18T08:42:28Z",
"revision_history": [
{
"date": "2025-06-18T08:42:28Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-requests-2.25.1-150300.3.15.1.noarch",
"product": {
"name": "python2-requests-2.25.1-150300.3.15.1.noarch",
"product_id": "python2-requests-2.25.1-150300.3.15.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-requests-2.25.1-150300.3.15.1.noarch",
"product": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch",
"product_id": "python3-requests-2.25.1-150300.3.15.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-requests-2.25.1-150300.3.15.1.noarch"
},
"product_reference": "python3-requests-2.25.1-150300.3.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-requests-2.25.1-150300.3.15.1.noarch"
},
"product_reference": "python3-requests-2.25.1-150300.3.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-requests-2.25.1-150300.3.15.1.noarch"
},
"product_reference": "python3-requests-2.25.1-150300.3.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-requests-2.25.1-150300.3.15.1.noarch"
},
"product_reference": "python3-requests-2.25.1-150300.3.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-requests-2.25.1-150300.3.15.1.noarch"
},
"product_reference": "python3-requests-2.25.1-150300.3.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-requests-2.25.1-150300.3.15.1.noarch"
},
"product_reference": "python3-requests-2.25.1-150300.3.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-requests-2.25.1-150300.3.15.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-requests-2.25.1-150300.3.15.1.noarch"
},
"product_reference": "python3-requests-2.25.1-150300.3.15.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.2:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.3:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.4:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.5:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-requests-2.25.1-150300.3.15.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.2:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.3:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.4:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.5:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-requests-2.25.1-150300.3.15.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.2:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.3:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.4:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Micro 5.5:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:python3-requests-2.25.1-150300.3.15.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-requests-2.25.1-150300.3.15.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-18T08:42:28Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
WID-SEC-W-2025-1699
Vulnerability from csaf_certbund - Published: 2025-08-03 22:00 - Updated: 2026-02-04 23:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (requests) (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux (requests) ausnutzen, um Informationen auszusp\u00e4hen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1699 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1699.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1699 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1699"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2025-08-03",
"url": "https://access.redhat.com/errata/RHSA-2025:12519"
},
{
"category": "external",
"summary": "RedHat Customer Portal vom 2025-08-03",
"url": "https://access.redhat.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12519 vom 2025-08-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-12519.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20531-1 vom 2025-08-05",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022110.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13234 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13234"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7241551 vom 2025-08-06",
"url": "https://www.ibm.com/support/pages/node/7241551"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13234 vom 2025-08-07",
"url": "http://linux.oracle.com/errata/ELSA-2025-13234.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13604 vom 2025-08-11",
"url": "https://access.redhat.com/errata/RHSA-2025:13604"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13604 vom 2025-08-11",
"url": "https://linux.oracle.com/errata/ELSA-2025-13604.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14750 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14750"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14750 vom 2025-08-27",
"url": "https://linux.oracle.com/errata/ELSA-2025-14750.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2025:14999"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15121 vom 2025-09-03",
"url": "https://access.redhat.com/errata/RHSA-2025:15121"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15122 vom 2025-09-03",
"url": "https://access.redhat.com/errata/RHSA-2025:15122"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14999 vom 2025-09-04",
"url": "https://linux.oracle.com/errata/ELSA-2025-14999.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14999 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14999"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14750 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14750"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15615 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15615"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15616 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15616"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15618 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15618"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15622 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15622"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15617 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15617"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15614 vom 2025-09-10",
"url": "https://access.redhat.com/errata/RHSA-2025:15614"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15691 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15691"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15723 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15723"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7246156 vom 2025-09-29",
"url": "https://www.ibm.com/support/pages/node/7246156"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:13604 vom 2025-10-03",
"url": "https://errata.build.resf.org/RLSA-2025:13604"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7249276 vom 2025-10-27",
"url": "https://www.ibm.com/support/pages/node/7249276"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3104 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3104.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7257913 vom 2026-01-23",
"url": "https://www.ibm.com/support/pages/node/7257913"
},
{
"category": "external",
"summary": "### vom 2026-01-23",
"url": "https://www.ibm.com/support/pages/node/7257913"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-1241 vom 2026-01-27",
"url": "https://linux.oracle.com/errata/ELSA-2026-1241.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2026-0201 vom 2026-02-04",
"url": "https://advisory.splunk.com//advisories/SVD-2026-0201"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (requests): Schwachstelle erm\u00f6glicht das Aussp\u00e4hen von Informationen",
"tracking": {
"current_release_date": "2026-02-04T23:00:00.000+00:00",
"generator": {
"date": "2026-02-05T10:00:43.747+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1699",
"initial_release_date": "2025-08-03T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-03T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-04T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-08-06T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat und IBM aufgenommen"
},
{
"date": "2025-08-07T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-10T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-09-01T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-03T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-04T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-09-10T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-10-05T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-02-04T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
}
],
"status": "final",
"version": "23"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "IBM Business Automation Workflow",
"product": {
"name": "IBM Business Automation Workflow",
"product_id": "T043411",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:business_automation_workflow:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Big SQL",
"product": {
"name": "IBM DB2 Big SQL",
"product_id": "T022379",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:db2:big_sql"
}
}
}
],
"category": "product_name",
"name": "DB2"
},
{
"category": "product_name",
"name": "IBM InfoSphere Information Server",
"product": {
"name": "IBM InfoSphere Information Server",
"product_id": "T035705",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:infosphere_information_server:-"
}
}
},
{
"category": "product_name",
"name": "IBM QRadar SIEM",
"product": {
"name": "IBM QRadar SIEM",
"product_id": "T021415",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:-"
}
}
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T035142",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.1.0",
"product": {
"name": "Splunk SOAR \u003c7.1.0",
"product_id": "T050521"
}
},
{
"category": "product_version",
"name": "7.1.0",
"product": {
"name": "Splunk SOAR 7.1.0",
"product_id": "T050521-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:soar:7.1.0"
}
}
}
],
"category": "product_name",
"name": "SOAR"
}
],
"category": "vendor",
"name": "Splunk"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"product_status": {
"known_affected": [
"T043411",
"T002207",
"T022379",
"T035705",
"T021415",
"T050521",
"398363",
"T035098",
"T035142",
"T004914",
"T032255"
]
},
"release_date": "2025-08-03T22:00:00.000+00:00",
"title": "CVE-2024-47081"
}
]
}
WID-SEC-W-2025-2648
Vulnerability from csaf_certbund - Published: 2025-11-19 23:00 - Updated: 2025-11-19 23:00{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "AIX ist ein Unix Betriebssystem von IBM.\r\nIBM Virtual I/O Server (VIOS) bietet Virtualisierungsfunktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in IBM AIX und IBM VIOS ausnutzen, um Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen oder eine Speicherbesch\u00e4digung durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2648 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2648.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2648 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2648"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2025-11-19",
"url": "https://www.ibm.com/support/pages/node/7251902"
}
],
"source_lang": "en-US",
"title": "IBM AIX und VIOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-19T23:00:00.000+00:00",
"generator": {
"date": "2025-11-20T11:42:10.626+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2648",
"initial_release_date": "2025-11-19T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-19T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "7.3 \u003cpython-3.9.24.0.tar.Z",
"product": {
"name": "IBM AIX 7.3 \u003cpython-3.9.24.0.tar.Z",
"product_id": "T048781"
}
},
{
"category": "product_version",
"name": "7.3 python-3.9.24.0.tar.Z",
"product": {
"name": "IBM AIX 7.3 python-3.9.24.0.tar.Z",
"product_id": "T048781-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3__python-3.9.24.0.tar.z"
}
}
},
{
"category": "product_version_range",
"name": "7.3 \u003cpython-3.11.14.0.tar.Z",
"product": {
"name": "IBM AIX 7.3 \u003cpython-3.11.14.0.tar.Z",
"product_id": "T048782"
}
},
{
"category": "product_version",
"name": "7.3 python-3.11.14.0.tar.Z",
"product": {
"name": "IBM AIX 7.3 python-3.11.14.0.tar.Z",
"product_id": "T048782-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3__python-3.11.14.0.tar.z"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "4.1 \u003cpython-3.11.14.0.tar.Z",
"product": {
"name": "IBM VIOS 4.1 \u003cpython-3.11.14.0.tar.Z",
"product_id": "T048783"
}
},
{
"category": "product_version",
"name": "4.1 python-3.11.14.0.tar.Z",
"product": {
"name": "IBM VIOS 4.1 python-3.11.14.0.tar.Z",
"product_id": "T048783-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1__python-3.11.14.0.tar.z"
}
}
},
{
"category": "product_version_range",
"name": "4.1 \u003cpython-3.9.24.0.tar.Z",
"product": {
"name": "IBM VIOS 4.1 \u003cpython-3.9.24.0.tar.Z",
"product_id": "T048784"
}
},
{
"category": "product_version",
"name": "4.1 python-3.9.24.0.tar.Z",
"product": {
"name": "IBM VIOS 4.1 python-3.9.24.0.tar.Z",
"product_id": "T048784-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1__python-3.9.24.0.tar.z"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"product_status": {
"known_affected": [
"T048784",
"T048783",
"T048782",
"T048781"
]
},
"release_date": "2025-11-19T23:00:00.000+00:00",
"title": "CVE-2024-47081"
},
{
"cve": "CVE-2024-5642",
"product_status": {
"known_affected": [
"T048784",
"T048783",
"T048782",
"T048781"
]
},
"release_date": "2025-11-19T23:00:00.000+00:00",
"title": "CVE-2024-5642"
},
{
"cve": "CVE-2025-59375",
"product_status": {
"known_affected": [
"T048784",
"T048783",
"T048782",
"T048781"
]
},
"release_date": "2025-11-19T23:00:00.000+00:00",
"title": "CVE-2025-59375"
},
{
"cve": "CVE-2025-6965",
"product_status": {
"known_affected": [
"T048784",
"T048783",
"T048782",
"T048781"
]
},
"release_date": "2025-11-19T23:00:00.000+00:00",
"title": "CVE-2025-6965"
}
]
}
BDU:2025-08576
Vulnerability from fstec - Published: 09.06.2025{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:C/I:N/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc., \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Python Software Foundation, \u0410\u041e \u00ab\u0421\u0431\u0435\u0440\u0422\u0435\u0445\u00bb, \u041e\u041e\u041e \u00ab\u041d\u0426\u041f\u0420\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12 SP3 (SUSE Linux Enterprise Server for SAP Applications), 12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3 (Suse Linux Enterprise Server), 12 SP4 (Suse Linux Enterprise Server), 12 (SUSE Linux Enterprise High Performance Computing), 12 (SUSE Linux Enterprise Module for Public Cloud), 12 SP5 (Suse Linux Enterprise Server), 12 SP5 (SUSE Linux Enterprise Server for SAP Applications), 12 (SUSE Linux Enterprise Server for SAP Applications), - (openSUSE Tumbleweed), 12 (Suse Linux Enterprise Server), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 5.1 (SUSE Linux Enterprise Micro), 15 SP4 (Suse Linux Enterprise Server), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 5.2 (SUSE Linux Enterprise Micro), 4.3 (SUSE Manager Retail Branch Server), 4.3 (SUSE Manager Proxy), 4.3 (SUSE Manager Server), 15 SP4 (SUSE Linux Enterprise High Performance Computing), 15 SP4 (SUSE Linux Enterprise Module for Public Cloud), 5.3 (SUSE Linux Enterprise Micro), 5.4 (SUSE Linux Enterprise Micro), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), 5.5 (SUSE Linux Enterprise Micro), 15 SP6 (Suse Linux Enterprise Desktop), 15 SP6 (Suse Linux Enterprise Server), 15 SP6 (SUSE Linux Enterprise Server for SAP Applications), 15 SP6 (SUSE Linux Enterprise High Performance Computing), 15 SP6 (SUSE Linux Enterprise Module for Basesystem), 15.6 (OpenSUSE Leap), 6.0 (SUSE Linux Enterprise Micro), 12 SP5 LTSS Extended Security (Suse Linux Enterprise Server), 15 SP6 (SUSE Linux Enterprise Module for Python 3), 15 SP7 (Suse Linux Enterprise Desktop), 15 SP7 (SUSE Linux Enterprise High Performance Computing), 15 SP7 (Suse Linux Enterprise Server), 15 SP7 (SUSE Linux Enterprise Server for SAP Applications), 15 SP7 (SUSE Linux Enterprise Module for Basesystem), 15 SP7 (SUSE Linux Enterprise Module for Python 3), \u0434\u043e 2.32.4 (requests), 9.1 (Platform V SberLinux OS Server), 9.5 (\u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef_x0001_\nhttps://github.com/psf/requests/pull/6965_x0001_\nhttps://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7_x0001_\nhttps://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: \nhttps://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-requests-cve-2024-47081/?sphrase_id=1087711\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2024-47081.html\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u041b\u042c\u0422 \u0421\u041f 10: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/\n\n\u0414\u043b\u044f \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430: https://errata.msvsphere-os.ru/definition/9/INFCSA-2025:12519?lang=ru",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.06.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "19.11.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "16.07.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-08576",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-47081",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "SUSE Linux Enterprise Server for SAP Applications, Suse Linux Enterprise Server, SUSE Linux Enterprise High Performance Computing, SUSE Linux Enterprise Module for Public Cloud, openSUSE Tumbleweed, \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), SUSE Linux Enterprise Micro, SUSE Manager Retail Branch Server, SUSE Manager Proxy, SUSE Manager Server, \u0410\u041b\u042c\u0422 \u0421\u041f 10, Suse Linux Enterprise Desktop, SUSE Linux Enterprise Module for Basesystem, OpenSUSE Leap, SUSE Linux Enterprise Module for Python 3, requests, Platform V SberLinux OS Server (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211618785), \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4 , Novell Inc. Suse Linux Enterprise Server 12 SP3 , Novell Inc. Suse Linux Enterprise Server 12 SP4 , Novell Inc. Suse Linux Enterprise Server 12 SP5 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP5 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 , Novell Inc. openSUSE Tumbleweed - , Novell Inc. Suse Linux Enterprise Server 12 , \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), Novell Inc. Suse Linux Enterprise Server 15 SP4 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - , Novell Inc. Suse Linux Enterprise Desktop 15 SP6 , Novell Inc. Suse Linux Enterprise Server 15 SP6 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP6 , Novell Inc. OpenSUSE Leap 15.6 , Novell Inc. Suse Linux Enterprise Server 12 SP5 LTSS Extended Security , Novell Inc. Suse Linux Enterprise Desktop 15 SP7 , Novell Inc. Suse Linux Enterprise Server 15 SP7 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP7 , \u0410\u041e \u00ab\u0421\u0431\u0435\u0440\u0422\u0435\u0445\u00bb Platform V SberLinux OS Server 9.1 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211618785), \u041e\u041e\u041e \u00ab\u041d\u0426\u041f\u0420\u00bb \u041c\u0421\u0412\u0421\u0444\u0435\u0440\u0430 9.5 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 HTTP \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Python Requests, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u0437\u0430\u0449\u0438\u0442\u0430 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-522)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 HTTP \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Python Requests \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u043e\u0439 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef_x0001_\nhttps://github.com/psf/requests/pull/6965_x0001_\nhttps://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7_x0001_\nhttps://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env\nhttps://redos.red-soft.ru/support/secure/uyazvimosti/uyazvimost-python2-requests-cve-2024-47081/?sphrase_id=1087711\nhttps://www.suse.com/security/cve/CVE-2024-47081.html\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://errata.msvsphere-os.ru/definition/9/INFCSA-2025:12519?lang=ru",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-522",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}
OPENSUSE-SU-2025:15281-1
Vulnerability from csaf_opensuse - Published: 2025-07-03 00:00 - Updated: 2025-07-03 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python311-requests-2.32.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python311-requests-2.32.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15281",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15281-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-47081 page",
"url": "https://www.suse.com/security/cve/CVE-2024-47081/"
}
],
"title": "python311-requests-2.32.4-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15281-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python311-requests-2.32.4-1.1.aarch64",
"product": {
"name": "python311-requests-2.32.4-1.1.aarch64",
"product_id": "python311-requests-2.32.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python312-requests-2.32.4-1.1.aarch64",
"product": {
"name": "python312-requests-2.32.4-1.1.aarch64",
"product_id": "python312-requests-2.32.4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python313-requests-2.32.4-1.1.aarch64",
"product": {
"name": "python313-requests-2.32.4-1.1.aarch64",
"product_id": "python313-requests-2.32.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-requests-2.32.4-1.1.ppc64le",
"product": {
"name": "python311-requests-2.32.4-1.1.ppc64le",
"product_id": "python311-requests-2.32.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python312-requests-2.32.4-1.1.ppc64le",
"product": {
"name": "python312-requests-2.32.4-1.1.ppc64le",
"product_id": "python312-requests-2.32.4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python313-requests-2.32.4-1.1.ppc64le",
"product": {
"name": "python313-requests-2.32.4-1.1.ppc64le",
"product_id": "python313-requests-2.32.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-requests-2.32.4-1.1.s390x",
"product": {
"name": "python311-requests-2.32.4-1.1.s390x",
"product_id": "python311-requests-2.32.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python312-requests-2.32.4-1.1.s390x",
"product": {
"name": "python312-requests-2.32.4-1.1.s390x",
"product_id": "python312-requests-2.32.4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python313-requests-2.32.4-1.1.s390x",
"product": {
"name": "python313-requests-2.32.4-1.1.s390x",
"product_id": "python313-requests-2.32.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python311-requests-2.32.4-1.1.x86_64",
"product": {
"name": "python311-requests-2.32.4-1.1.x86_64",
"product_id": "python311-requests-2.32.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python312-requests-2.32.4-1.1.x86_64",
"product": {
"name": "python312-requests-2.32.4-1.1.x86_64",
"product_id": "python312-requests-2.32.4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python313-requests-2.32.4-1.1.x86_64",
"product": {
"name": "python313-requests-2.32.4-1.1.x86_64",
"product_id": "python313-requests-2.32.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-requests-2.32.4-1.1.aarch64"
},
"product_reference": "python311-requests-2.32.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-requests-2.32.4-1.1.ppc64le"
},
"product_reference": "python311-requests-2.32.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.32.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-requests-2.32.4-1.1.s390x"
},
"product_reference": "python311-requests-2.32.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-requests-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-requests-2.32.4-1.1.x86_64"
},
"product_reference": "python311-requests-2.32.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-requests-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-requests-2.32.4-1.1.aarch64"
},
"product_reference": "python312-requests-2.32.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-requests-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-requests-2.32.4-1.1.ppc64le"
},
"product_reference": "python312-requests-2.32.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-requests-2.32.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-requests-2.32.4-1.1.s390x"
},
"product_reference": "python312-requests-2.32.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python312-requests-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python312-requests-2.32.4-1.1.x86_64"
},
"product_reference": "python312-requests-2.32.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-requests-2.32.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-requests-2.32.4-1.1.aarch64"
},
"product_reference": "python313-requests-2.32.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-requests-2.32.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-requests-2.32.4-1.1.ppc64le"
},
"product_reference": "python313-requests-2.32.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-requests-2.32.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-requests-2.32.4-1.1.s390x"
},
"product_reference": "python313-requests-2.32.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python313-requests-2.32.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python313-requests-2.32.4-1.1.x86_64"
},
"product_reference": "python313-requests-2.32.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-47081"
}
],
"notes": [
{
"category": "general",
"text": "Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one\u0027s Requests Session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.x86_64",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.x86_64",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-47081",
"url": "https://www.suse.com/security/cve/CVE-2024-47081"
},
{
"category": "external",
"summary": "SUSE Bug 1244039 for CVE-2024-47081",
"url": "https://bugzilla.suse.com/1244039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.x86_64",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.x86_64",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python311-requests-2.32.4-1.1.x86_64",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python312-requests-2.32.4-1.1.x86_64",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.aarch64",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.ppc64le",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.s390x",
"openSUSE Tumbleweed:python313-requests-2.32.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-47081"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.