Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-69720 (GCVE-0-2025-69720)
Vulnerability from cvelistv5 – Published: 2026-03-19 00:00 – Updated: 2026-03-26 15:08- CWE-121 - Stack-based Buffer Overflow
| URL | Tags | |
|---|---|---|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-69720",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-24T01:05:11.996191Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-24T01:06:56.021Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ncurses",
"vendor": "GNU",
"versions": [
{
"lessThan": "6.5-20251213",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.5-20251213",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c."
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121 Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-26T15:08:06.834Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2"
},
{
"url": "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2"
},
{
"url": "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2"
},
{
"url": "https://github.com/Cao-Wuhui/CVE-2025-69720"
},
{
"url": "https://invisible-island.net/archives/ncurses/6.5/"
},
{
"url": "https://invisible-island.net/ncurses/"
}
],
"x_generator": {
"engine": "enrichogram 0.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-69720",
"datePublished": "2026-03-19T00:00:00.000Z",
"dateReserved": "2026-01-09T00:00:00.000Z",
"dateUpdated": "2026-03-26T15:08:06.834Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-69720\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2026-03-19T15:16:21.293\",\"lastModified\":\"2026-03-26T19:35:10.547\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\"},{\"lang\":\"es\",\"value\":\"ncurses v6.5 y v6.4 son vulnerables a desbordamiento de b\u00fafer en progs/infocmp.c, funci\u00f3n analyze_string().\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":5.5},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"cve@mitre.org\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.4\",\"matchCriteriaId\":\"4F833BCF-B5C0-4AD1-8D3D-F32F39D63ABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240427:*:*:*:*:*:*\",\"matchCriteriaId\":\"01C6DAFD-5194-497F-A396-306919613DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240504:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B59129C-B8AE-4043-9E9A-3340AE9FDE0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240511:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CB16CE1-D8ED-40D2-917C-3E23769D11A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240518:*:*:*:*:*:*\",\"matchCriteriaId\":\"81784D7B-85D5-4570-A2FA-12A6EA2ED29D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240519:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DDED53-9D63-441D-B85A-A5FBAC8F8F0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240525:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D6CF1A5-BCC5-4452-ABE3-6AEB2A5C19E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240601:*:*:*:*:*:*\",\"matchCriteriaId\":\"95423C26-3583-450A-BDAF-2A3C76959920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240608:*:*:*:*:*:*\",\"matchCriteriaId\":\"E59E117A-7813-4686-8A52-B2A99A45D6F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240615:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B1487C-518E-425D-A89E-32CDF754CD3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240622:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0343D0B-8D98-4F15-8166-68012A62CBC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240629:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFC1BE47-198C-4B29-938A-D33127B7A758\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240706:*:*:*:*:*:*\",\"matchCriteriaId\":\"373EB650-F970-40A5-BD32-09BEE34F48B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240713:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCB11782-AE68-4784-BCCC-05817C4D2AE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240720:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FFED224-2F31-4877-B469-B8ED88186D4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240727:*:*:*:*:*:*\",\"matchCriteriaId\":\"9052908B-E79B-4758-8BB8-D716751B674E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240810:*:*:*:*:*:*\",\"matchCriteriaId\":\"94B0EC59-5F4C-4835-B6D3-6646873D9EEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240817:*:*:*:*:*:*\",\"matchCriteriaId\":\"568EF5E6-F534-4A64-A17E-0E1C8B58EB3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240824:*:*:*:*:*:*\",\"matchCriteriaId\":\"803C48AD-237B-4BF8-8424-BB4ACFCCF001\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240831:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D22BA4A-0C03-4679-ABB4-54DCA427E105\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240914:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0361067-595F-43B2-AFD8-9BEF6C37785F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240922:*:*:*:*:*:*\",\"matchCriteriaId\":\"62EAEBD3-870E-477C-B9D3-8ED0E7BAF974\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20240928:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C173F79-8726-4EE6-8C63-E0756C9AC993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241006:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDCA5EFB-7D8F-4448-8C48-D04C4E5A8D0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241019:*:*:*:*:*:*\",\"matchCriteriaId\":\"F724BD25-215C-4774-A564-6D41C89B8F6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241026:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35CD022-20E1-417D-871A-552570D470C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241102:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ACD19D6-1CDC-4C7A-9DBB-A9C441850BEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241109:*:*:*:*:*:*\",\"matchCriteriaId\":\"431FBF60-D9BF-434A-B103-CEE445D08F28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241123:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E07FBF9-2D38-4A5E-92E9-6374E1024297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241130:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA0F9B1C-DCB2-473D-8086-D1F35BEDB9C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241207:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC35855B-F702-48E9-AD8E-DBE542B29CD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241214:*:*:*:*:*:*\",\"matchCriteriaId\":\"920C5FD1-3614-4252-9F19-089CF2FDAF96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241221:*:*:*:*:*:*\",\"matchCriteriaId\":\"C134C17C-AB7D-4182-9D2F-98DE5615ACAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20241228:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AAE6560-8BB3-4761-AFA3-6FF4CF3931C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250104:*:*:*:*:*:*\",\"matchCriteriaId\":\"786764EE-4C0A-4801-BA0A-6751350E574D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250111:*:*:*:*:*:*\",\"matchCriteriaId\":\"488796C4-88A8-4F62-A9C0-E96DF926C59B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250118:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8EAFB1-DB1C-4107-987C-12C803F98C9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250125:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4738B1-966C-4999-8DEC-6E3317957664\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250201:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F1AACB-C3DF-4511-A261-B5BA24013645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250208:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B386A4-D643-4B27-83F2-57ADC2F190C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250215:*:*:*:*:*:*\",\"matchCriteriaId\":\"60E7F820-9A4D-48D1-A817-A582CEC9CD54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250216:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D2291EE-1EA4-48E0-9CA6-2A6DD644F4F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250222:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E4353C2-22B4-44DB-817F-4BDB385B6DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250301:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CFFF73B-C236-424D-B3A8-B03DE0A3D608\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250308:*:*:*:*:*:*\",\"matchCriteriaId\":\"F077FBC1-03F0-48EC-8D1A-91A0D34A526F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250315:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF4DF4F2-C8DC-43E1-A38D-D13C402BAB7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250322:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9198719-6C21-4C72-ADAA-C34D47FBCCA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250329:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C22701-BFF0-4A09-B8B8-2851D34B5DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250405:*:*:*:*:*:*\",\"matchCriteriaId\":\"74FB0A6F-C157-429A-A769-6B5ED94296C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250412:*:*:*:*:*:*\",\"matchCriteriaId\":\"70B219DA-5D24-4AA2-9EBA-EDEAE59BBFE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250419:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6443172-FB7F-408B-A104-86B98F4FEEE3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250426:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCE6DEF3-9792-4BF7-AF16-B59DA2CB066A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250503:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB98C70C-02EA-4A97-A475-BC30170C90A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250510:*:*:*:*:*:*\",\"matchCriteriaId\":\"166696C0-BC8E-47E5-814B-B8D8AF0F9DBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250517:*:*:*:*:*:*\",\"matchCriteriaId\":\"49C22417-14A4-4CFB-BAF0-B53F9EA19E8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250524:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7642084-2D96-4604-A43B-43C777B243A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250531:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80D2BF8-0795-4CA5-B33F-14024FEB9C7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250614:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F73803B-F963-4AE5-8A45-01FCFC991D15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250621:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDA61BDD-96FF-42D6-8145-5B4F2D27EB81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250628:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E855110-A534-4035-A52D-AEA00FB46F7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250705:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1013BF-649F-402F-A746-08F51D243384\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250712:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA2CC90-D9C7-47E1-A0CC-C9C8B5692297\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250720:*:*:*:*:*:*\",\"matchCriteriaId\":\"F50B46A2-2730-416B-91F9-003A8F31A34E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250726:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC9CBD76-49EB-4F2F-B423-C29295383692\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250802:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4620E27-7771-4D47-99DD-317CD5051469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250809:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DF12182-D312-4118-8708-38C990D22542\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250816:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF1E3C6A-F963-4B32-A7AA-DFB7D60775DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250823:*:*:*:*:*:*\",\"matchCriteriaId\":\"5152E3B8-6B07-455A-9A1F-ED564EF41C66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250830:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC15F32E-9F0B-4268-B487-621249016034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250913:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E4F453B-6948-4E87-AEA6-19AC85DEF3DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250920:*:*:*:*:*:*\",\"matchCriteriaId\":\"47A4E2C3-38DF-4E0C-9C99-F27258D5F46D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20250927:*:*:*:*:*:*\",\"matchCriteriaId\":\"47BECB6C-23E4-41B1-889A-FDEEB36A658E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251004:*:*:*:*:*:*\",\"matchCriteriaId\":\"F686C3CA-4EEA-412A-BC2D-C491FE5C3216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251010:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFC895B9-95C1-4DBF-9FAF-46DB073D1D84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251018:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD76C797-9CCD-4435-BD0B-4BDC635D18F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251025:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FBA0671-FCA3-4EBC-BF88-6EEDF94A55B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251101:*:*:*:*:*:*\",\"matchCriteriaId\":\"924191D6-7FC1-49FB-BE3C-C788B7EFD031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251115:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CF94C0-97BF-4370-AF63-2673C99F9835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251122:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DE8A0A0-74CF-4850-9974-681BC8EAF606\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251123:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D5CA575-EDE5-4E42-B465-284C4B9BD822\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251129:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACA7CB1C-8F84-497E-A48E-E975D625CD43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:invisible-island:ncurses:6.5:20251206:*:*:*:*:*:*\",\"matchCriteriaId\":\"46993193-F710-4CBF-AA5A-3218E2A53BC6\"}]}]}],\"references\":[{\"url\":\"https://github.com/Cao-Wuhui/CVE-2025-69720\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://invisible-island.net/archives/ncurses/6.5/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\"]},{\"url\":\"https://invisible-island.net/ncurses/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Product\"]},{\"url\":\"https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Mailing List\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-69720\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-24T01:05:11.996191Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-120\", \"description\": \"CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-24T01:06:48.727Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.3, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L\"}}], \"affected\": [{\"vendor\": \"GNU\", \"product\": \"ncurses\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"6.5-20251213\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2\"}, {\"url\": \"https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2\"}, {\"url\": \"https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2\"}, {\"url\": \"https://github.com/Cao-Wuhui/CVE-2025-69720\"}, {\"url\": \"https://invisible-island.net/archives/ncurses/6.5/\"}, {\"url\": \"https://invisible-island.net/ncurses/\"}], \"x_generator\": {\"engine\": \"enrichogram 0.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-121\", \"description\": \"CWE-121 Stack-based Buffer Overflow\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:gnu:ncurses:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"6.5-20251213\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2026-03-26T15:08:06.834Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-69720\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-26T15:08:06.834Z\", \"dateReserved\": \"2026-01-09T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2026-03-19T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-9952-MRQJ-H4JH
Vulnerability from github – Published: 2026-03-19 15:31 – Updated: 2026-03-26 15:30ncurses v6.5 and v6.4 are vulnerable to Buffer Overflow in progs/infocmp.c, function analyze_string().
{
"affected": [],
"aliases": [
"CVE-2025-69720"
],
"database_specific": {
"cwe_ids": [
"CWE-120",
"CWE-121"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-19T15:16:21Z",
"severity": "CRITICAL"
},
"details": "ncurses v6.5 and v6.4 are vulnerable to Buffer Overflow in progs/infocmp.c, function analyze_string().",
"id": "GHSA-9952-mrqj-h4jh",
"modified": "2026-03-26T15:30:30Z",
"published": "2026-03-19T15:31:21Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69720"
},
{
"type": "WEB",
"url": "https://github.com/Cao-Wuhui/CVE-2025-69720"
},
{
"type": "WEB",
"url": "https://invisible-island.net/archives/ncurses/6.5"
},
{
"type": "WEB",
"url": "https://invisible-island.net/ncurses"
},
{
"type": "WEB",
"url": "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2"
},
{
"type": "WEB",
"url": "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2"
},
{
"type": "WEB",
"url": "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2026-0875
Vulnerability from csaf_certbund - Published: 2026-03-25 23:00 - Updated: 2026-03-26 23:00{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in Red Hat Enterprise Linux (ncurses) ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2026-0875 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2026/wid-sec-w-2026-0875.json"
},
{
"category": "self",
"summary": "WID-SEC-2026-0875 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2026-0875"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2026-03-25",
"url": "https://access.redhat.com/errata/RHSA-2026:5913"
},
{
"category": "external",
"summary": "RedHat Customer Portal vom 2026-03-25",
"url": "https://access.redhat.com/security/cve/cve-2025-69720"
},
{
"category": "external",
"summary": "CVE Record vom 2026-03-25",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69720"
},
{
"category": "external",
"summary": "Red Hat Bugzilla",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449037"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-5913 vom 2026-03-26",
"url": "https://linux.oracle.com/errata/ELSA-2026-5913.html"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (ncurses): Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2026-03-26T23:00:00.000+00:00",
"generator": {
"date": "2026-03-27T09:01:44.962+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2026-0875",
"initial_release_date": "2026-03-25T23:00:00.000+00:00",
"revision_history": [
{
"date": "2026-03-25T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2026-03-26T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "10",
"product": {
"name": "Red Hat Enterprise Linux 10",
"product_id": "T050429",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-69720",
"product_status": {
"known_affected": [
"T050429",
"T004914"
]
},
"release_date": "2026-03-25T23:00:00.000+00:00",
"title": "CVE-2025-69720"
}
]
}
RHSA-2026:5913
Vulnerability from csaf_redhat - Published: 2026-03-26 09:44 - Updated: 2026-03-26 19:48A flaw was found in ncurses. This vulnerability, a buffer overflow, exists within the `analyze_string()` function. An attacker could potentially exploit this to execute unauthorized code on the affected system, which might lead to a denial of service in the affected application, the corruption of data, or sensitive information being revealed to an attacker.
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for ncurses is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.\n\nSecurity Fix(es):\n\n* ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution. (CVE-2025-69720)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2026:5913",
"url": "https://access.redhat.com/errata/RHSA-2026:5913"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2449037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449037"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5913.json"
}
],
"title": "Red Hat Security Advisory: ncurses security update",
"tracking": {
"current_release_date": "2026-03-26T19:48:43+00:00",
"generator": {
"date": "2026-03-26T19:48:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2026:5913",
"initial_release_date": "2026-03-26T09:44:20+00:00",
"revision_history": [
{
"date": "2026-03-26T09:44:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2026-03-26T09:44:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-26T19:48:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.1"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.4-15.20240127.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.4-15.20240127.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.4-15.20240127.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.4-15.20240127.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.4-15.20240127.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.4-15.20240127.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.4-15.20240127.el10_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"product": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"product_id": "ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.4-15.20240127.el10_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"product": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"product_id": "ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.4-15.20240127.el10_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.4-15.20240127.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.4-15.20240127.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.4-15.20240127.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.4-15.20240127.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.4-15.20240127.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.4-15.20240127.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.4-15.20240127.el10_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"product": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"product_id": "ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.4-15.20240127.el10_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs@6.4-15.20240127.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-devel@6.4-15.20240127.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debugsource@6.4-15.20240127.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-c%2B%2B-libs-debuginfo@6.4-15.20240127.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-debuginfo@6.4-15.20240127.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs-debuginfo@6.4-15.20240127.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.4-15.20240127.el10_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"product": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"product_id": "ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-libs@6.4-15.20240127.el10_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"product": {
"name": "ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"product_id": "ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-term@6.4-15.20240127.el10_1?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"product": {
"name": "ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"product_id": "ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses-base@6.4-15.20240127.el10_1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "ncurses-0:6.4-15.20240127.el10_1.src",
"product": {
"name": "ncurses-0:6.4-15.20240127.el10_1.src",
"product_id": "ncurses-0:6.4-15.20240127.el10_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ncurses@6.4-15.20240127.el10_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.src",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.4-15.20240127.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch"
},
"product_reference": "ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.4-15.20240127.el10_1.noarch as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch"
},
"product_reference": "ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"relates_to_product_reference": "AppStream-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.src",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-base-0:6.4-15.20240127.el10_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch"
},
"product_reference": "ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-devel-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64"
},
"product_reference": "ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"relates_to_product_reference": "BaseOS-10.1.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ncurses-term-0:6.4-15.20240127.el10_1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch"
},
"product_reference": "ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"relates_to_product_reference": "BaseOS-10.1.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-69720",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2026-03-19T15:01:28.019574+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2449037"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in ncurses. This vulnerability, a buffer overflow, exists within the `analyze_string()` function. An attacker could potentially exploit this to execute unauthorized code on the affected system, which might lead to a denial of service in the affected application, the corruption of data, or sensitive information being revealed to an attacker.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution.",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-69720"
},
{
"category": "external",
"summary": "RHBZ#2449037",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2449037"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-69720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-69720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69720"
},
{
"category": "external",
"summary": "https://github.com/Cao-Wuhui/CVE-2025-69720",
"url": "https://github.com/Cao-Wuhui/CVE-2025-69720"
},
{
"category": "external",
"summary": "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2",
"url": "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2"
},
{
"category": "external",
"summary": "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2",
"url": "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2"
},
{
"category": "external",
"summary": "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2",
"url": "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2"
}
],
"release_date": "2026-03-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-26T09:44:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2026:5913"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src",
"AppStream-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"AppStream-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"AppStream-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.src",
"BaseOS-10.1.Z:ncurses-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-base-0:6.4-15.20240127.el10_1.noarch",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-c++-libs-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-c++-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-debugsource-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-devel-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-libs-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.aarch64",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.ppc64le",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.s390x",
"BaseOS-10.1.Z:ncurses-libs-debuginfo-0:6.4-15.20240127.el10_1.x86_64",
"BaseOS-10.1.Z:ncurses-term-0:6.4-15.20240127.el10_1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution."
}
]
}
MSRC_CVE-2025-69720
Vulnerability from csaf_microsoft - Published: 2026-03-02 00:00 - Updated: 2026-03-31 15:18| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-69720 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-69720.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "CVE-2025-69720",
"tracking": {
"current_release_date": "2026-03-31T15:18:12.000Z",
"generator": {
"date": "2026-04-01T07:38:22.489Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-69720",
"initial_release_date": "2026-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2026-03-25T01:04:59.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-03-28T14:37:51.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-03-31T15:18:12.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 ncurses 6.4-2",
"product": {
"name": "\u003cazl3 ncurses 6.4-2",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 ncurses 6.4-2",
"product": {
"name": "azl3 ncurses 6.4-2",
"product_id": "19855"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 ncurses 6.4-3",
"product": {
"name": "\u003cazl3 ncurses 6.4-3",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 ncurses 6.4-3",
"product": {
"name": "azl3 ncurses 6.4-3",
"product_id": "21102"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 ncurses 6.4-3",
"product": {
"name": "\u003ccbl2 ncurses 6.4-3",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 ncurses 6.4-3",
"product": {
"name": "cbl2 ncurses 6.4-3",
"product_id": "18227"
}
}
],
"category": "product_name",
"name": "ncurses"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 ncurses 6.4-2 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 ncurses 6.4-2 as a component of Azure Linux 3.0",
"product_id": "19855-17084"
},
"product_reference": "19855",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 ncurses 6.4-3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 ncurses 6.4-3 as a component of Azure Linux 3.0",
"product_id": "21102-17084"
},
"product_reference": "21102",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 ncurses 6.4-3 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 ncurses 6.4-3 as a component of CBL Mariner 2.0",
"product_id": "18227-17086"
},
"product_reference": "18227",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-69720",
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19855-17084",
"21102-17084",
"18227-17086"
],
"known_affected": [
"17084-2",
"17084-1",
"17086-3"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-69720 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2026/msrc_cve-2025-69720.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2026-03-25T01:04:59.000Z",
"details": "6.4-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-2",
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2026-03-25T01:04:59.000Z",
"details": "6.4-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"17084-2",
"17084-1",
"17086-3"
]
}
],
"title": "CVE-2025-69720"
}
]
}
CERTFR-2026-AVI-0376
Vulnerability from certfr_avis - Published: 2026-03-30 - Updated: 2026-03-30
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | CBL Mariner | cbl2 telegraf 1.29.4-21 versions antérieures à 1.29.4-22 | ||
| Microsoft | Azure Linux | azl3 glibc 2.38-18 versions antérieures à 2.38-19 | ||
| Microsoft | Azure Linux | azl3 squid 6.13-3 versions antérieures à 6.13-4 | ||
| Microsoft | Azure Linux | azl3 python-pyasn1 0.4.8-1 versions antérieures à 0.4.8-2 | ||
| Microsoft | Azure Linux | azl3 nginx 1.28.2-1 versions antérieures à 1.28.3-1 | ||
| Microsoft | CBL Mariner | cbl2 ncurses 6.4-3 versions antérieures à 6.4-4 | ||
| Microsoft | Azure Linux | azl3 kernel 6.6.126.1-1 versions antérieures à 6.6.130.1-1 | ||
| Microsoft | Azure Linux | azl3 ncurses 6.4-2 versions antérieures à 6.4-3 | ||
| Microsoft | CBL Mariner | cbl2 terraform 1.3.2-29 versions antérieures à 1.3.2-30 | ||
| Microsoft | Azure Linux | azl3 libsoup 3.4.4-12 versions antérieures à 3.4.4-14 | ||
| Microsoft | Azure Linux | azl3 etcd 3.5.21-1 versions antérieures à 3.5.28-1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 telegraf 1.29.4-21 versions ant\u00e9rieures \u00e0 1.29.4-22",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 glibc 2.38-18 versions ant\u00e9rieures \u00e0 2.38-19",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 squid 6.13-3 versions ant\u00e9rieures \u00e0 6.13-4",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-pyasn1 0.4.8-1 versions ant\u00e9rieures \u00e0 0.4.8-2",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nginx 1.28.2-1 versions ant\u00e9rieures \u00e0 1.28.3-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 ncurses 6.4-3 versions ant\u00e9rieures \u00e0 6.4-4",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel 6.6.126.1-1 versions ant\u00e9rieures \u00e0 6.6.130.1-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 ncurses 6.4-2 versions ant\u00e9rieures \u00e0 6.4-3",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 terraform 1.3.2-29 versions ant\u00e9rieures \u00e0 1.3.2-30",
"product": {
"name": "CBL Mariner",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libsoup 3.4.4-12 versions ant\u00e9rieures \u00e0 3.4.4-14",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 etcd 3.5.21-1 versions ant\u00e9rieures \u00e0 3.5.28-1",
"product": {
"name": "Azure Linux",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-23318",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23318"
},
{
"name": "CVE-2026-23368",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23368"
},
{
"name": "CVE-2026-23281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23281"
},
{
"name": "CVE-2026-32647",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32647"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2026-23293",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23293"
},
{
"name": "CVE-2026-23290",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23290"
},
{
"name": "CVE-2026-27651",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27651"
},
{
"name": "CVE-2026-23303",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23303"
},
{
"name": "CVE-2026-27654",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27654"
},
{
"name": "CVE-2026-23340",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23340"
},
{
"name": "CVE-2026-23253",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23253"
},
{
"name": "CVE-2026-33343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33343"
},
{
"name": "CVE-2026-23271",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23271"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2026-23285",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23285"
},
{
"name": "CVE-2026-23304",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23304"
},
{
"name": "CVE-2026-23357",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23357"
},
{
"name": "CVE-2026-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4645"
},
{
"name": "CVE-2026-23324",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23324"
},
{
"name": "CVE-2026-23347",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23347"
},
{
"name": "CVE-2026-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28755"
},
{
"name": "CVE-2026-23317",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23317"
},
{
"name": "CVE-2026-23334",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23334"
},
{
"name": "CVE-2026-23391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23391"
},
{
"name": "CVE-2026-23319",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23319"
},
{
"name": "CVE-2026-23279",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23279"
},
{
"name": "CVE-2026-23244",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23244"
},
{
"name": "CVE-2026-23246",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23246"
},
{
"name": "CVE-2026-30922",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-30922"
},
{
"name": "CVE-2026-23286",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23286"
},
{
"name": "CVE-2026-23359",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23359"
},
{
"name": "CVE-2026-23298",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23298"
},
{
"name": "CVE-2026-23296",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23296"
},
{
"name": "CVE-2026-23396",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23396"
},
{
"name": "CVE-2026-23370",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23370"
},
{
"name": "CVE-2026-23315",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23315"
},
{
"name": "CVE-2026-23352",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23352"
},
{
"name": "CVE-2026-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23367"
},
{
"name": "CVE-2026-32748",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32748"
},
{
"name": "CVE-2026-23300",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23300"
},
{
"name": "CVE-2026-23379",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23379"
},
{
"name": "CVE-2026-23381",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23381"
},
{
"name": "CVE-2026-23392",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23392"
},
{
"name": "CVE-2026-23245",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23245"
},
{
"name": "CVE-2026-4438",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4438"
},
{
"name": "CVE-2026-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23364"
},
{
"name": "CVE-2026-23274",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23274"
},
{
"name": "CVE-2026-23284",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23284"
},
{
"name": "CVE-2026-23397",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23397"
},
{
"name": "CVE-2026-23343",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23343"
},
{
"name": "CVE-2026-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23336"
},
{
"name": "CVE-2025-69720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69720"
},
{
"name": "CVE-2026-23289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23289"
},
{
"name": "CVE-2026-23292",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23292"
},
{
"name": "CVE-2026-23277",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23277"
},
{
"name": "CVE-2026-4437",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4437"
},
{
"name": "CVE-2026-27784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27784"
},
{
"name": "CVE-2026-23388",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23388"
},
{
"name": "CVE-2026-28753",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28753"
},
{
"name": "CVE-2026-33526",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33526"
},
{
"name": "CVE-2026-23310",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23310"
},
{
"name": "CVE-2026-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2369"
},
{
"name": "CVE-2026-33515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33515"
},
{
"name": "CVE-2026-23395",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23395"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2026-23306",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23306"
},
{
"name": "CVE-2026-33413",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33413"
},
{
"name": "CVE-2026-23291",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23291"
},
{
"name": "CVE-2026-23382",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23382"
},
{
"name": "CVE-2026-23312",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23312"
},
{
"name": "CVE-2026-23365",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23365"
},
{
"name": "CVE-2026-23356",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23356"
},
{
"name": "CVE-2026-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23307"
},
{
"name": "CVE-2026-23398",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23398"
},
{
"name": "CVE-2026-23351",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23351"
},
{
"name": "CVE-2026-23390",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23390"
}
],
"initial_release_date": "2026-03-30T00:00:00",
"last_revision_date": "2026-03-30T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0376",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32748",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32748"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4438",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4438"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23347",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23347"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23268",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23268"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23392",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23392"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23319",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23319"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23253"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23296",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23296"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23364",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23364"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23368",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23368"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27654",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27654"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-30922",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-30922"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23286",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23286"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23396",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23396"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23340",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23340"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23324"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33515",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33515"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23318",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23318"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23379",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23379"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23317",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23317"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27784",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27784"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23359",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23359"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23245"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23269",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23269"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23298",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23298"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23304",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23304"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23370",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23370"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23100",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23100"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23271",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23271"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23352",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23352"
},
{
"published_at": "2026-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33343"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4437",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4437"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23343",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23343"
},
{
"published_at": "2026-03-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33413",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33413"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23246",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23246"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23279",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23279"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23244"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23367",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23367"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23307",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23307"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23398",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23398"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-69720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-69720"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28755",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28755"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23300",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23300"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23381",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23381"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23356",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23356"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23351",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23351"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23277",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23277"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23315",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23315"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-4645",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-4645"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-33526",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33526"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23382"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23310",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23310"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23306",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23306"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23336",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23336"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-2369",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-2369"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23391",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23391"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23290",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23290"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23312",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23312"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23388",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23388"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23390",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23390"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23303",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23303"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23289",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23289"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23293",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23293"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-27651",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-27651"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23291",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23291"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-28753",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-28753"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23334",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23334"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-32647",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32647"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23397",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23397"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23281",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23281"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23365",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23365"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23285",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23285"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23292",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23292"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23284",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23284"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23395",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23395"
},
{
"published_at": "2026-03-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23274",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23274"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2026-23357",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-23357"
}
]
}
alsa-2026:5913
Vulnerability from osv_almalinux
The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo.
Security Fix(es):
- ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution. (CVE-2025-69720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "ncurses"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4-15.20240127.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "ncurses-base"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4-15.20240127.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "ncurses-c++-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4-15.20240127.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "ncurses-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4-15.20240127.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "ncurses-libs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4-15.20240127.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:10",
"name": "ncurses-term"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4-15.20240127.el10_1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The ncurses (new curses) library routines are a terminal-independent method of updating character screens with reasonable optimization. The ncurses packages contain support utilities including a terminfo compiler tic, a decompiler infocmp, clear, tput, tset, and a termcap conversion tool captoinfo. \n\nSecurity Fix(es): \n\n * ncurses: ncurses: Buffer overflow vulnerability may lead to arbitrary code execution. (CVE-2025-69720)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2026:5913",
"modified": "2026-03-27T10:30:59Z",
"published": "2026-03-26T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2026:5913"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2025-69720"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2449037"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/10/ALSA-2026-5913.html"
}
],
"related": [
"CVE-2025-69720"
],
"summary": "Moderate: ncurses security update"
}
FKIE_CVE-2025-69720
Vulnerability from fkie_nvd - Published: 2026-03-19 15:16 - Updated: 2026-03-26 19:357.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/Cao-Wuhui/CVE-2025-69720 | Exploit, Third Party Advisory | |
| cve@mitre.org | https://invisible-island.net/archives/ncurses/6.5/ | Release Notes | |
| cve@mitre.org | https://invisible-island.net/ncurses/ | Product | |
| cve@mitre.org | https://marc.info/?l=ncurses-bug&m=176539968328570&w=2 | Issue Tracking, Mailing List, Vendor Advisory | |
| cve@mitre.org | https://marc.info/?l=ncurses-bug&m=176540731801330&w=2 | Issue Tracking, Mailing List, Vendor Advisory | |
| cve@mitre.org | https://marc.info/?l=ncurses-bug&m=176545557728083&w=2 | Issue Tracking, Mailing List, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| invisible-island | ncurses | * | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 | |
| invisible-island | ncurses | 6.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F833BCF-B5C0-4AD1-8D3D-F32F39D63ABA",
"versionEndIncluding": "6.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240427:*:*:*:*:*:*",
"matchCriteriaId": "01C6DAFD-5194-497F-A396-306919613DA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240504:*:*:*:*:*:*",
"matchCriteriaId": "2B59129C-B8AE-4043-9E9A-3340AE9FDE0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240511:*:*:*:*:*:*",
"matchCriteriaId": "0CB16CE1-D8ED-40D2-917C-3E23769D11A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240518:*:*:*:*:*:*",
"matchCriteriaId": "81784D7B-85D5-4570-A2FA-12A6EA2ED29D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240519:*:*:*:*:*:*",
"matchCriteriaId": "30DDED53-9D63-441D-B85A-A5FBAC8F8F0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240525:*:*:*:*:*:*",
"matchCriteriaId": "8D6CF1A5-BCC5-4452-ABE3-6AEB2A5C19E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240601:*:*:*:*:*:*",
"matchCriteriaId": "95423C26-3583-450A-BDAF-2A3C76959920",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240608:*:*:*:*:*:*",
"matchCriteriaId": "E59E117A-7813-4686-8A52-B2A99A45D6F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240615:*:*:*:*:*:*",
"matchCriteriaId": "F6B1487C-518E-425D-A89E-32CDF754CD3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240622:*:*:*:*:*:*",
"matchCriteriaId": "B0343D0B-8D98-4F15-8166-68012A62CBC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240629:*:*:*:*:*:*",
"matchCriteriaId": "FFC1BE47-198C-4B29-938A-D33127B7A758",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240706:*:*:*:*:*:*",
"matchCriteriaId": "373EB650-F970-40A5-BD32-09BEE34F48B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240713:*:*:*:*:*:*",
"matchCriteriaId": "FCB11782-AE68-4784-BCCC-05817C4D2AE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240720:*:*:*:*:*:*",
"matchCriteriaId": "8FFED224-2F31-4877-B469-B8ED88186D4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240727:*:*:*:*:*:*",
"matchCriteriaId": "9052908B-E79B-4758-8BB8-D716751B674E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240810:*:*:*:*:*:*",
"matchCriteriaId": "94B0EC59-5F4C-4835-B6D3-6646873D9EEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240817:*:*:*:*:*:*",
"matchCriteriaId": "568EF5E6-F534-4A64-A17E-0E1C8B58EB3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240824:*:*:*:*:*:*",
"matchCriteriaId": "803C48AD-237B-4BF8-8424-BB4ACFCCF001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240831:*:*:*:*:*:*",
"matchCriteriaId": "0D22BA4A-0C03-4679-ABB4-54DCA427E105",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240914:*:*:*:*:*:*",
"matchCriteriaId": "D0361067-595F-43B2-AFD8-9BEF6C37785F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240922:*:*:*:*:*:*",
"matchCriteriaId": "62EAEBD3-870E-477C-B9D3-8ED0E7BAF974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20240928:*:*:*:*:*:*",
"matchCriteriaId": "5C173F79-8726-4EE6-8C63-E0756C9AC993",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241006:*:*:*:*:*:*",
"matchCriteriaId": "FDCA5EFB-7D8F-4448-8C48-D04C4E5A8D0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241019:*:*:*:*:*:*",
"matchCriteriaId": "F724BD25-215C-4774-A564-6D41C89B8F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241026:*:*:*:*:*:*",
"matchCriteriaId": "C35CD022-20E1-417D-871A-552570D470C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241102:*:*:*:*:*:*",
"matchCriteriaId": "1ACD19D6-1CDC-4C7A-9DBB-A9C441850BEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241109:*:*:*:*:*:*",
"matchCriteriaId": "431FBF60-D9BF-434A-B103-CEE445D08F28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241123:*:*:*:*:*:*",
"matchCriteriaId": "7E07FBF9-2D38-4A5E-92E9-6374E1024297",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241130:*:*:*:*:*:*",
"matchCriteriaId": "CA0F9B1C-DCB2-473D-8086-D1F35BEDB9C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241207:*:*:*:*:*:*",
"matchCriteriaId": "FC35855B-F702-48E9-AD8E-DBE542B29CD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241214:*:*:*:*:*:*",
"matchCriteriaId": "920C5FD1-3614-4252-9F19-089CF2FDAF96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241221:*:*:*:*:*:*",
"matchCriteriaId": "C134C17C-AB7D-4182-9D2F-98DE5615ACAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20241228:*:*:*:*:*:*",
"matchCriteriaId": "6AAE6560-8BB3-4761-AFA3-6FF4CF3931C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250104:*:*:*:*:*:*",
"matchCriteriaId": "786764EE-4C0A-4801-BA0A-6751350E574D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250111:*:*:*:*:*:*",
"matchCriteriaId": "488796C4-88A8-4F62-A9C0-E96DF926C59B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250118:*:*:*:*:*:*",
"matchCriteriaId": "5F8EAFB1-DB1C-4107-987C-12C803F98C9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250125:*:*:*:*:*:*",
"matchCriteriaId": "CF4738B1-966C-4999-8DEC-6E3317957664",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250201:*:*:*:*:*:*",
"matchCriteriaId": "C2F1AACB-C3DF-4511-A261-B5BA24013645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250208:*:*:*:*:*:*",
"matchCriteriaId": "B9B386A4-D643-4B27-83F2-57ADC2F190C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250215:*:*:*:*:*:*",
"matchCriteriaId": "60E7F820-9A4D-48D1-A817-A582CEC9CD54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250216:*:*:*:*:*:*",
"matchCriteriaId": "3D2291EE-1EA4-48E0-9CA6-2A6DD644F4F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250222:*:*:*:*:*:*",
"matchCriteriaId": "2E4353C2-22B4-44DB-817F-4BDB385B6DC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250301:*:*:*:*:*:*",
"matchCriteriaId": "2CFFF73B-C236-424D-B3A8-B03DE0A3D608",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250308:*:*:*:*:*:*",
"matchCriteriaId": "F077FBC1-03F0-48EC-8D1A-91A0D34A526F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250315:*:*:*:*:*:*",
"matchCriteriaId": "BF4DF4F2-C8DC-43E1-A38D-D13C402BAB7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250322:*:*:*:*:*:*",
"matchCriteriaId": "D9198719-6C21-4C72-ADAA-C34D47FBCCA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250329:*:*:*:*:*:*",
"matchCriteriaId": "17C22701-BFF0-4A09-B8B8-2851D34B5DA0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250405:*:*:*:*:*:*",
"matchCriteriaId": "74FB0A6F-C157-429A-A769-6B5ED94296C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250412:*:*:*:*:*:*",
"matchCriteriaId": "70B219DA-5D24-4AA2-9EBA-EDEAE59BBFE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250419:*:*:*:*:*:*",
"matchCriteriaId": "A6443172-FB7F-408B-A104-86B98F4FEEE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250426:*:*:*:*:*:*",
"matchCriteriaId": "DCE6DEF3-9792-4BF7-AF16-B59DA2CB066A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250503:*:*:*:*:*:*",
"matchCriteriaId": "EB98C70C-02EA-4A97-A475-BC30170C90A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250510:*:*:*:*:*:*",
"matchCriteriaId": "166696C0-BC8E-47E5-814B-B8D8AF0F9DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250517:*:*:*:*:*:*",
"matchCriteriaId": "49C22417-14A4-4CFB-BAF0-B53F9EA19E8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250524:*:*:*:*:*:*",
"matchCriteriaId": "B7642084-2D96-4604-A43B-43C777B243A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250531:*:*:*:*:*:*",
"matchCriteriaId": "D80D2BF8-0795-4CA5-B33F-14024FEB9C7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250614:*:*:*:*:*:*",
"matchCriteriaId": "2F73803B-F963-4AE5-8A45-01FCFC991D15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250621:*:*:*:*:*:*",
"matchCriteriaId": "CDA61BDD-96FF-42D6-8145-5B4F2D27EB81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250628:*:*:*:*:*:*",
"matchCriteriaId": "4E855110-A534-4035-A52D-AEA00FB46F7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250705:*:*:*:*:*:*",
"matchCriteriaId": "BF1013BF-649F-402F-A746-08F51D243384",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250712:*:*:*:*:*:*",
"matchCriteriaId": "2DA2CC90-D9C7-47E1-A0CC-C9C8B5692297",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250720:*:*:*:*:*:*",
"matchCriteriaId": "F50B46A2-2730-416B-91F9-003A8F31A34E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250726:*:*:*:*:*:*",
"matchCriteriaId": "BC9CBD76-49EB-4F2F-B423-C29295383692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250802:*:*:*:*:*:*",
"matchCriteriaId": "A4620E27-7771-4D47-99DD-317CD5051469",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250809:*:*:*:*:*:*",
"matchCriteriaId": "1DF12182-D312-4118-8708-38C990D22542",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250816:*:*:*:*:*:*",
"matchCriteriaId": "AF1E3C6A-F963-4B32-A7AA-DFB7D60775DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250823:*:*:*:*:*:*",
"matchCriteriaId": "5152E3B8-6B07-455A-9A1F-ED564EF41C66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250830:*:*:*:*:*:*",
"matchCriteriaId": "CC15F32E-9F0B-4268-B487-621249016034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250913:*:*:*:*:*:*",
"matchCriteriaId": "7E4F453B-6948-4E87-AEA6-19AC85DEF3DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250920:*:*:*:*:*:*",
"matchCriteriaId": "47A4E2C3-38DF-4E0C-9C99-F27258D5F46D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20250927:*:*:*:*:*:*",
"matchCriteriaId": "47BECB6C-23E4-41B1-889A-FDEEB36A658E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251004:*:*:*:*:*:*",
"matchCriteriaId": "F686C3CA-4EEA-412A-BC2D-C491FE5C3216",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251010:*:*:*:*:*:*",
"matchCriteriaId": "EFC895B9-95C1-4DBF-9FAF-46DB073D1D84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251018:*:*:*:*:*:*",
"matchCriteriaId": "FD76C797-9CCD-4435-BD0B-4BDC635D18F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251025:*:*:*:*:*:*",
"matchCriteriaId": "8FBA0671-FCA3-4EBC-BF88-6EEDF94A55B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251101:*:*:*:*:*:*",
"matchCriteriaId": "924191D6-7FC1-49FB-BE3C-C788B7EFD031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251115:*:*:*:*:*:*",
"matchCriteriaId": "F6CF94C0-97BF-4370-AF63-2673C99F9835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251122:*:*:*:*:*:*",
"matchCriteriaId": "9DE8A0A0-74CF-4850-9974-681BC8EAF606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251123:*:*:*:*:*:*",
"matchCriteriaId": "9D5CA575-EDE5-4E42-B465-284C4B9BD822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251129:*:*:*:*:*:*",
"matchCriteriaId": "ACA7CB1C-8F84-497E-A48E-E975D625CD43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:invisible-island:ncurses:6.5:20251206:*:*:*:*:*:*",
"matchCriteriaId": "46993193-F710-4CBF-AA5A-3218E2A53BC6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The infocmp command-line tool in ncurses before 6.5-20251213 has a stack-based buffer overflow in analyze_string in progs/infocmp.c."
},
{
"lang": "es",
"value": "ncurses v6.5 y v6.4 son vulnerables a desbordamiento de b\u00fafer en progs/infocmp.c, funci\u00f3n analyze_string()."
}
],
"id": "CVE-2025-69720",
"lastModified": "2026-03-26T19:35:10.547",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-03-19T15:16:21.293",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Cao-Wuhui/CVE-2025-69720"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes"
],
"url": "https://invisible-island.net/archives/ncurses/6.5/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://invisible-island.net/ncurses/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
],
"url": "https://marc.info/?l=ncurses-bug\u0026m=176539968328570\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
],
"url": "https://marc.info/?l=ncurses-bug\u0026m=176540731801330\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mailing List",
"Vendor Advisory"
],
"url": "https://marc.info/?l=ncurses-bug\u0026m=176545557728083\u0026w=2"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "cve@mitre.org",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.