Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-29390 (GCVE-0-2021-29390)
Vulnerability from cvelistv5 – Published: 2023-08-22 00:00 – Updated: 2024-10-04 16:11
VLAI?
EPSS
Summary
libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:02:51.858Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"
},
{
"tags": [
"x_transferred"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"
},
{
"name": "FEDORA-2023-d79ff22c5b",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/"
},
{
"name": "FEDORA-2023-3bfb63f6d2",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"name": "FEDORA-2023-b427f54e68",
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-29390",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T16:08:32.914099Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T16:11:31.673Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-21T02:07:13.454Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797"
},
{
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"
},
{
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"
},
{
"name": "FEDORA-2023-d79ff22c5b",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/"
},
{
"name": "FEDORA-2023-3bfb63f6d2",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"name": "FEDORA-2023-b427f54e68",
"tags": [
"vendor-advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29390",
"datePublished": "2023-08-22T00:00:00.000Z",
"dateReserved": "2021-03-29T00:00:00.000Z",
"dateUpdated": "2024-10-04T16:11:31.673Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-29390\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2023-08-22T19:16:20.237\",\"lastModified\":\"2024-11-21T06:01:01.670\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.\"},{\"lang\":\"es\",\"value\":\"libjpeg-turbo versi\u00f3n 2.0.90 tiene una sobrelectura del b\u00fafer (2 bytes) en decompress_smooth_data en jdcoefct.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.90:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA5809B6-0C5C-44C6-A2BF-4CE81A4D9200\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1943797\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1943797\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\"]},{\"url\":\"https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1943797\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/\", \"name\": \"FEDORA-2023-d79ff22c5b\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/\", \"name\": \"FEDORA-2023-3bfb63f6d2\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/\", \"name\": \"FEDORA-2023-b427f54e68\", \"tags\": [\"vendor-advisory\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T22:02:51.858Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-29390\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-04T16:08:32.914099Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-04T16:11:27.626Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1943797\"}, {\"url\": \"https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595\"}, {\"url\": \"https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/\", \"name\": \"FEDORA-2023-d79ff22c5b\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/\", \"name\": \"FEDORA-2023-3bfb63f6d2\", \"tags\": [\"vendor-advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/\", \"name\": \"FEDORA-2023-b427f54e68\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2023-09-21T02:07:13.454Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-29390\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-04T16:11:31.673Z\", \"dateReserved\": \"2021-03-29T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2023-08-22T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
RHSA-2024:2295
Vulnerability from csaf_redhat - Published: 2024-04-30 09:58 - Updated: 2025-11-21 18:59Summary
Red Hat Security Advisory: libjpeg-turbo security update
Notes
Topic
An update for libjpeg-turbo is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.
Security Fix(es):
* libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c (CVE-2021-29390)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libjpeg-turbo is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libjpeg-turbo packages contain a library of functions for manipulating JPEG images. They also contain simple client programs for accessing the libjpeg functions. These packages provide the same functionality and API as libjpeg but with better performance.\n\nSecurity Fix(es):\n\n* libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c (CVE-2021-29390)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2295",
"url": "https://access.redhat.com/errata/RHSA-2024:2295"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2235521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235521"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2295.json"
}
],
"title": "Red Hat Security Advisory: libjpeg-turbo security update",
"tracking": {
"current_release_date": "2025-11-21T18:59:59+00:00",
"generator": {
"date": "2025-11-21T18:59:59+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2024:2295",
"initial_release_date": "2024-04-30T09:58:44+00:00",
"revision_history": [
{
"date": "2024-04-30T09:58:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T09:58:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:59:59+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "turbojpeg-0:2.0.90-7.el9.aarch64",
"product": {
"name": "turbojpeg-0:2.0.90-7.el9.aarch64",
"product_id": "turbojpeg-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"product": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"product_id": "turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-devel@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"product": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"product_id": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debugsource@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"product": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"product_id": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"product": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"product_id": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils-debuginfo@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"product": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"product_id": "turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-debuginfo@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"product": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"product_id": "libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"product": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"product_id": "libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"product": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"product_id": "libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils@2.0.90-7.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "turbojpeg-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "turbojpeg-0:2.0.90-7.el9.ppc64le",
"product_id": "turbojpeg-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"product_id": "turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-devel@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"product_id": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debugsource@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"product_id": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"product_id": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils-debuginfo@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"product_id": "turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-debuginfo@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"product_id": "libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"product_id": "libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"product": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"product_id": "libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils@2.0.90-7.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "turbojpeg-0:2.0.90-7.el9.i686",
"product": {
"name": "turbojpeg-0:2.0.90-7.el9.i686",
"product_id": "turbojpeg-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg@2.0.90-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-devel-0:2.0.90-7.el9.i686",
"product": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.i686",
"product_id": "turbojpeg-devel-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-devel@2.0.90-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"product": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"product_id": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debugsource@2.0.90-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"product": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"product_id": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@2.0.90-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"product": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"product_id": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils-debuginfo@2.0.90-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"product": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"product_id": "turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-debuginfo@2.0.90-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-0:2.0.90-7.el9.i686",
"product": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.i686",
"product_id": "libjpeg-turbo-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo@2.0.90-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"product": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"product_id": "libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-7.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "turbojpeg-0:2.0.90-7.el9.x86_64",
"product": {
"name": "turbojpeg-0:2.0.90-7.el9.x86_64",
"product_id": "turbojpeg-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"product": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"product_id": "turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-devel@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"product": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"product_id": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debugsource@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"product": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"product_id": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"product": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"product_id": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils-debuginfo@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"product": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"product_id": "turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-debuginfo@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"product": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"product_id": "libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"product": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"product_id": "libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"product": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"product_id": "libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils@2.0.90-7.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "turbojpeg-0:2.0.90-7.el9.s390x",
"product": {
"name": "turbojpeg-0:2.0.90-7.el9.s390x",
"product_id": "turbojpeg-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-devel-0:2.0.90-7.el9.s390x",
"product": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.s390x",
"product_id": "turbojpeg-devel-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-devel@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"product": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"product_id": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debugsource@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"product": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"product_id": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-debuginfo@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"product": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"product_id": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils-debuginfo@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"product": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"product_id": "turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/turbojpeg-debuginfo@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-0:2.0.90-7.el9.s390x",
"product": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.s390x",
"product_id": "libjpeg-turbo-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"product": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"product_id": "libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-devel@2.0.90-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"product": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"product_id": "libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo-utils@2.0.90-7.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libjpeg-turbo-0:2.0.90-7.el9.src",
"product": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.src",
"product_id": "libjpeg-turbo-0:2.0.90-7.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libjpeg-turbo@2.0.90-7.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.src",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64"
},
"product_reference": "turbojpeg-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64"
},
"product_reference": "turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.i686",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.s390x",
"relates_to_product_reference": "CRB-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "turbojpeg-devel-0:2.0.90-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64"
},
"product_reference": "turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29390",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2235521"
}
],
"notes": [
{
"category": "description",
"text": "A heap buffer over-read flaw was found in libjpeg-turbo. For certain types of smoothed jpeg images, the decompress_smooth_data() function may improperly enter a condition statement that leads to heap memory read of uninitialized data, which may cause an application crash or loss of confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The amount of memory read is very small and not controllable by an attacker, which lowers the impact of this flaw to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29390"
},
{
"category": "external",
"summary": "RHBZ#2235521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29390",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29390"
},
{
"category": "external",
"summary": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commit/ccaba5d7894ecfb5a8f11e48d3f86e1f14d5a469"
},
{
"category": "external",
"summary": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/459#issuecomment-733720010",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/459#issuecomment-733720010"
},
{
"category": "external",
"summary": "https://github.com/libjpeg-turbo/libjpeg-turbo/pull/476",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/pull/476"
},
{
"category": "external",
"summary": "https://github.com/libjpeg-turbo/libjpeg-turbo/pull/724",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/pull/724"
}
],
"release_date": "2023-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:58:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2295"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src",
"AppStream-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x",
"AppStream-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.src",
"CRB-9.4.0.GA:libjpeg-turbo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-debugsource-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-devel-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-utils-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:libjpeg-turbo-utils-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-debuginfo-0:2.0.90-7.el9.x86_64",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.aarch64",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.i686",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.ppc64le",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.s390x",
"CRB-9.4.0.GA:turbojpeg-devel-0:2.0.90-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libjpeg-turbo: heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c"
}
]
}
WID-SEC-W-2024-0995
Vulnerability from csaf_certbund - Published: 2024-04-29 22:00 - Updated: 2025-11-17 23:00Summary
Red Hat Enterprise Linux: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat Enterprise Linux (RHEL) ist eine populäre Linux-Distribution.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen, Dateien zu manipulieren oder seine Privilegien zu erweitern.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen, Dateien zu manipulieren oder seine Privilegien zu erweitern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0995 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0995.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0995 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0995"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2137"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2147"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2295"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2337"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2366"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2396"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2512"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2199"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2204"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2024-04-29",
"url": "https://access.redhat.com/errata/RHSA-2024:2438"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3105 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3105"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3120 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3120"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3044 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3044"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3139 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3139"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3163 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3163"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3008 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3008"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-3044 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-3044.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:0136-2 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018909.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2375-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018915.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202409-06 vom 2024-09-22",
"url": "https://security.gentoo.org/glsa/202409-06"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10965 vom 2024-12-11",
"url": "https://access.redhat.com/errata/RHSA-2024:10965"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11250 vom 2024-12-19",
"url": "https://linux.oracle.com/errata/ELSA-2024-11250.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7266-1 vom 2025-02-13",
"url": "https://ubuntu.com/security/notices/USN-7266-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13098 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13098"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13100 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13100"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13101 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13101"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13103 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13103"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13104 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13104"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13102 vom 2025-08-06",
"url": "https://access.redhat.com/errata/RHSA-2025:13102"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14553 vom 2025-08-26",
"url": "https://access.redhat.com/errata/RHSA-2025:14553"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14553 vom 2025-08-26",
"url": "https://linux.oracle.com/errata/ELSA-2025-14553.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15874 vom 2025-09-16",
"url": "https://access.redhat.com/errata/RHSA-2025:15874"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15874 vom 2025-09-17",
"url": "https://linux.oracle.com/errata/ELSA-2025-15874.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:15874 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:15874"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7870-1 vom 2025-11-18",
"url": "https://ubuntu.com/security/notices/USN-7870-1"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-17T23:00:00.000+00:00",
"generator": {
"date": "2025-11-18T08:17:28.561+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-0995",
"initial_release_date": "2024-04-29T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-29T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-09-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Ubuntu aufgenommen"
}
],
"status": "final",
"version": "15"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T034465",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Red Hat Enterprise Linux 8",
"product_id": "T034466",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8"
}
}
},
{
"category": "product_version",
"name": "7",
"product": {
"name": "Red Hat Enterprise Linux 7",
"product_id": "T034467",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-29390",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2021-29390"
},
{
"cve": "CVE-2022-48554",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2022-48554"
},
{
"cve": "CVE-2023-1729",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2023-1729"
},
{
"cve": "CVE-2023-49083",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2023-49083"
},
{
"cve": "CVE-2023-5215",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2023-5215"
},
{
"cve": "CVE-2023-5871",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2023-5871"
},
{
"cve": "CVE-2024-1481",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2024-1481"
},
{
"cve": "CVE-2024-22365",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-24258",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2024-24258"
},
{
"cve": "CVE-2024-24259",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2024-24259"
},
{
"cve": "CVE-2021-40153",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2021-40153"
},
{
"cve": "CVE-2021-41072",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2021-41072"
},
{
"cve": "CVE-2023-41915",
"product_status": {
"known_affected": [
"T034467",
"T002207",
"67646",
"T000126",
"T012167",
"T004914",
"T034466",
"T032255",
"T034465"
]
},
"release_date": "2024-04-29T22:00:00.000+00:00",
"title": "CVE-2023-41915"
}
]
}
WID-SEC-W-2024-1226
Vulnerability from csaf_certbund - Published: 2024-05-22 22:00 - Updated: 2025-11-18 23:00Summary
Red Hat OpenShift: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Red Hat OpenShift ist eine "Platform as a Service" (PaaS) Lösung zur Bereitstellung von Applikationen in der Cloud.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuführen.
Betroffene Betriebssysteme
- Linux
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um Dateien zu manipulieren, einen Denial-of-Service-Zustand zu verursachen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, seine Privilegien zu erweitern oder um weitere nicht spezifizierte Angriffe auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1226 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1226.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1226 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1226"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2874"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2929 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2929"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2930 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2930"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2932 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2933 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2933"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2874 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3316"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2901 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:2901"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3473 vom 2024-05-29",
"url": "https://access.redhat.com/errata/RHSA-2024:3473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3790 vom 2024-06-11",
"url": "https://access.redhat.com/errata/RHSA-2024:3790"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3715 vom 2024-06-12",
"url": "https://access.redhat.com/errata/RHSA-2024:3715"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3314 vom 2024-06-13",
"url": "https://access.redhat.com/errata/RHSA-2024:3314"
},
{
"category": "external",
"summary": "RedHat Security Advisory",
"url": "https://access.redhat.com/errata/RHSA-2024:3919"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:3830 vom 2024-06-14",
"url": "https://errata.build.resf.org/RLSA-2024:3830"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:3827 vom 2024-06-14",
"url": "https://errata.build.resf.org/RLSA-2024:3827"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3868 vom 2024-06-17",
"url": "https://access.redhat.com/errata/RHSA-2024:3868"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:3826 vom 2024-06-14",
"url": "https://errata.build.resf.org/RLSA-2024:3826"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3889 vom 2024-06-19",
"url": "https://access.redhat.com/errata/RHSA-2024:3889"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3989 vom 2024-06-20",
"url": "https://access.redhat.com/errata/RHSA-2024:3989"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4163 vom 2024-06-27",
"url": "https://access.redhat.com/errata/RHSA-2024:4163"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3637 vom 2024-07-01",
"url": "https://access.redhat.com/errata/RHSA-2024:3637"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1616 vom 2024-07-01",
"url": "https://access.redhat.com/errata/RHSA-2024:1616"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3617 vom 2024-07-01",
"url": "https://access.redhat.com/errata/RHSA-2024:3617"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4269 vom 2024-07-03",
"url": "https://access.redhat.com/errata/RHSA-2024:4269"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4553 vom 2024-07-16",
"url": "https://access.redhat.com/errata/RHSA-2024:4553"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4699 vom 2024-07-25",
"url": "https://access.redhat.com/errata/RHSA-2024:4699"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4455 vom 2024-07-29",
"url": "https://access.redhat.com/errata/RHSA-2024:4455"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASDOCKER-2024-041 vom 2024-08-13",
"url": "https://alas.aws.amazon.com/AL2/ALASDOCKER-2024-041.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5422 vom 2024-08-20",
"url": "https://access.redhat.com/errata/RHSA-2024:5422"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5745 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5745"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6667 vom 2024-09-13",
"url": "https://access.redhat.com/errata/RHSA-2024:6667"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6755 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6755"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7164 vom 2024-09-26",
"url": "https://access.redhat.com/errata/RHSA-2024:7164"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7184"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8676 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8676"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8677 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8677"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8688 vom 2024-11-06",
"url": "https://access.redhat.com/errata/RHSA-2024:8688"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8692 vom 2024-11-07",
"url": "https://access.redhat.com/errata/RHSA-2024:8692"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:9088 vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9088"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7121-2 vom 2024-11-20",
"url": "https://ubuntu.com/security/notices/USN-7121-2"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0164 vom 2025-01-09",
"url": "https://access.redhat.com/errata/RHSA-2025:0164"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0323 vom 2025-01-15",
"url": "https://access.redhat.com/errata/RHSA-2025:0323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0664 vom 2025-01-23",
"url": "https://access.redhat.com/errata/RHSA-2025:0664"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0832 vom 2025-02-06",
"url": "https://access.redhat.com/errata/RHSA-2025:0832"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2876 vom 2025-03-17",
"url": "https://access.redhat.com/errata/RHSA-2025:2876"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:7753 vom 2025-05-16",
"url": "https://access.redhat.com/errata/RHSA-2025:7753"
},
{
"category": "external",
"summary": "Atlassian Security Bulletin - November 18 2025",
"url": "https://confluence.atlassian.com/security/security-bulletin-november-18-2025-1671463469.html"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-18T23:00:00.000+00:00",
"generator": {
"date": "2025-11-19T09:42:49.985+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2024-1226",
"initial_release_date": "2024-05-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-23T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-10T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-11T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-13T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-16T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation und Red Hat aufgenommen"
},
{
"date": "2024-06-18T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-19T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-27T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-30T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-02T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-15T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-25T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-29T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-20T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-25T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-01-08T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-23T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-05T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-16T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-11-18T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates aufgenommen"
}
],
"status": "final",
"version": "34"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.2",
"product": {
"name": "Atlassian Bitbucket \u003c10.0.2",
"product_id": "T048675"
}
},
{
"category": "product_version",
"name": "10.0.2",
"product": {
"name": "Atlassian Bitbucket 10.0.2",
"product_id": "T048675-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:10.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.19.25 (LTS)",
"product": {
"name": "Atlassian Bitbucket \u003c8.19.25 (LTS)",
"product_id": "T048676"
}
},
{
"category": "product_version",
"name": "8.19.25 (LTS)",
"product": {
"name": "Atlassian Bitbucket 8.19.25 (LTS)",
"product_id": "T048676-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:8.19.25_%28lts%29"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.4.13 (LTS)",
"product": {
"name": "Atlassian Bitbucket \u003c9.4.13 (LTS)",
"product_id": "T048677"
}
},
{
"category": "product_version",
"name": "9.4.13 (LTS)",
"product": {
"name": "Atlassian Bitbucket 9.4.13 (LTS)",
"product_id": "T048677-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:atlassian:bitbucket:9.4.13_%28lts%29"
}
}
}
],
"category": "product_name",
"name": "Bitbucket"
}
],
"category": "vendor",
"name": "Atlassian"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Advanced Cluster Security for Kubernetes 4",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
"product_id": "T033787",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "T035142",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T038901",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "Secondary Scheduler Operator",
"product": {
"name": "Red Hat OpenShift Secondary Scheduler Operator",
"product_id": "T027759",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:::secondary_scheduler_operator"
}
}
},
{
"category": "product_version",
"name": "Kube Descheduler Operator 5",
"product": {
"name": "Red Hat OpenShift Kube Descheduler Operator 5",
"product_id": "T033270",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:kube_descheduler_operator_5"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenShift",
"product": {
"name": "Red Hat OpenShift",
"product_id": "T035034",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:-"
}
}
},
{
"category": "product_version_range",
"name": "Migration Toolkit for Applications \u003c7.0.3",
"product": {
"name": "Red Hat OpenShift Migration Toolkit for Applications \u003c7.0.3",
"product_id": "T035036"
}
},
{
"category": "product_version",
"name": "Migration Toolkit for Applications 7.0.3",
"product": {
"name": "Red Hat OpenShift Migration Toolkit for Applications 7.0.3",
"product_id": "T035036-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:migration_toolkit_for_applications__7.0.3"
}
}
},
{
"category": "product_version",
"name": "Custom Metric Autoscaler 2",
"product": {
"name": "Red Hat OpenShift Custom Metric Autoscaler 2",
"product_id": "T035047",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:custom_metric_autoscaler_2"
}
}
},
{
"category": "product_version",
"name": "Network Observability 1.6",
"product": {
"name": "Red Hat OpenShift Network Observability 1.6",
"product_id": "T035431",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:network_observability_1.6"
}
}
},
{
"category": "product_version",
"name": "GitOps 1.12",
"product": {
"name": "Red Hat OpenShift GitOps 1.12",
"product_id": "T035679",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:gitops_1.12"
}
}
},
{
"category": "product_version",
"name": "Run Once Duration Override Operator 1",
"product": {
"name": "Red Hat OpenShift Run Once Duration Override Operator 1",
"product_id": "T035698",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:run_once_duration_override_operator_1"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.16.8",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.16.8",
"product_id": "T036959"
}
},
{
"category": "product_version",
"name": "Container Platform 4.16.8",
"product": {
"name": "Red Hat OpenShift Container Platform 4.16.8",
"product_id": "T036959-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.16.8"
}
}
},
{
"category": "product_version_range",
"name": "for Windows Containers \u003c10.15.3",
"product": {
"name": "Red Hat OpenShift for Windows Containers \u003c10.15.3",
"product_id": "T036993"
}
},
{
"category": "product_version",
"name": "for Windows Containers 10.15.3",
"product": {
"name": "Red Hat OpenShift for Windows Containers 10.15.3",
"product_id": "T036993-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:for_windows_containers__10.15.3"
}
}
},
{
"category": "product_version",
"name": "CodeReady Workspaces",
"product": {
"name": "Red Hat OpenShift CodeReady Workspaces",
"product_id": "T037618",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:codeready_workspaces"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.38",
"product_id": "T037940"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.38",
"product_id": "T037940-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38"
}
}
},
{
"category": "product_version_range",
"name": "Data Foundation \u003c4.14.13",
"product": {
"name": "Red Hat OpenShift Data Foundation \u003c4.14.13",
"product_id": "T040215"
}
},
{
"category": "product_version",
"name": "Data Foundation 4.14.13",
"product": {
"name": "Red Hat OpenShift Data Foundation 4.14.13",
"product_id": "T040215-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:data_foundation__4.14.13"
}
}
},
{
"category": "product_version_range",
"name": "Serverless Logic \u003c1.35.0",
"product": {
"name": "Red Hat OpenShift Serverless Logic \u003c1.35.0",
"product_id": "T040597"
}
},
{
"category": "product_version",
"name": "Serverless Logic 1.35.0",
"product": {
"name": "Red Hat OpenShift Serverless Logic 1.35.0",
"product_id": "T040597-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:serverless_logic__1.35.0"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.72",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.72",
"product_id": "T040822"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.72",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.72",
"product_id": "T040822-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.72"
}
}
},
{
"category": "product_version_range",
"name": "GitOps \u003c1.15.2",
"product": {
"name": "Red Hat OpenShift GitOps \u003c1.15.2",
"product_id": "T043834"
}
},
{
"category": "product_version",
"name": "GitOps 1.15.2",
"product": {
"name": "Red Hat OpenShift GitOps 1.15.2",
"product_id": "T043834-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:gitops__1.15.2"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-26555",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2020-26555"
},
{
"cve": "CVE-2021-25220",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2021-25220"
},
{
"cve": "CVE-2021-29390",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2021-29390"
},
{
"cve": "CVE-2021-43618",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2021-43618"
},
{
"cve": "CVE-2022-0480",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-0480"
},
{
"cve": "CVE-2022-2795",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-3094",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-3094"
},
{
"cve": "CVE-2022-38096",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-40090",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-40090"
},
{
"cve": "CVE-2022-45934",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-48554",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-48554"
},
{
"cve": "CVE-2022-48624",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2022-48624"
},
{
"cve": "CVE-2023-24023",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2023-25193",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25775",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-25775"
},
{
"cve": "CVE-2023-26159",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-26159"
},
{
"cve": "CVE-2023-26364",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-26364"
},
{
"cve": "CVE-2023-28322",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28464",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28866",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-28866"
},
{
"cve": "CVE-2023-2975",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-31083",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-31083"
},
{
"cve": "CVE-2023-31122",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-31122"
},
{
"cve": "CVE-2023-3446",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-3567",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3567"
},
{
"cve": "CVE-2023-3618",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3618"
},
{
"cve": "CVE-2023-37453",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-37453"
},
{
"cve": "CVE-2023-3817",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-38469",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38469"
},
{
"cve": "CVE-2023-38470",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38470"
},
{
"cve": "CVE-2023-38471",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38471"
},
{
"cve": "CVE-2023-38472",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38472"
},
{
"cve": "CVE-2023-38473",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38473"
},
{
"cve": "CVE-2023-38546",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-38546"
},
{
"cve": "CVE-2023-39189",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39189"
},
{
"cve": "CVE-2023-39193",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39193"
},
{
"cve": "CVE-2023-39194",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39194"
},
{
"cve": "CVE-2023-39198",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39198"
},
{
"cve": "CVE-2023-39326",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39326"
},
{
"cve": "CVE-2023-40745",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-40745"
},
{
"cve": "CVE-2023-41175",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-41175"
},
{
"cve": "CVE-2023-4133",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-4133"
},
{
"cve": "CVE-2023-42754",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-42754"
},
{
"cve": "CVE-2023-42756",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-42756"
},
{
"cve": "CVE-2023-43785",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43785"
},
{
"cve": "CVE-2023-43786",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43786"
},
{
"cve": "CVE-2023-43787",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43787"
},
{
"cve": "CVE-2023-43788",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43788"
},
{
"cve": "CVE-2023-43789",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-43789"
},
{
"cve": "CVE-2023-4408",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-45286",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45286"
},
{
"cve": "CVE-2023-45287",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45287"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2023-45289",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45289"
},
{
"cve": "CVE-2023-45290",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45290"
},
{
"cve": "CVE-2023-45857",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45857"
},
{
"cve": "CVE-2023-45863",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45863"
},
{
"cve": "CVE-2023-46218",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46862",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-46862"
},
{
"cve": "CVE-2023-47038",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-47038"
},
{
"cve": "CVE-2023-48631",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-48631"
},
{
"cve": "CVE-2023-50387",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-50387"
},
{
"cve": "CVE-2023-50868",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-51043",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-51043"
},
{
"cve": "CVE-2023-51779",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-51779"
},
{
"cve": "CVE-2023-51780",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-51780"
},
{
"cve": "CVE-2023-52425",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52425"
},
{
"cve": "CVE-2023-52434",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52434"
},
{
"cve": "CVE-2023-52448",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52476",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52476"
},
{
"cve": "CVE-2023-52489",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52489"
},
{
"cve": "CVE-2023-52522",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52522"
},
{
"cve": "CVE-2023-52529",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52529"
},
{
"cve": "CVE-2023-52574",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52574"
},
{
"cve": "CVE-2023-52578",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52578"
},
{
"cve": "CVE-2023-52580",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52580"
},
{
"cve": "CVE-2023-52581",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52581"
},
{
"cve": "CVE-2023-52597",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52597"
},
{
"cve": "CVE-2023-52610",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52610"
},
{
"cve": "CVE-2023-52620",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-52620"
},
{
"cve": "CVE-2023-5678",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-6040",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6040"
},
{
"cve": "CVE-2023-6121",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6121"
},
{
"cve": "CVE-2023-6129",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6129"
},
{
"cve": "CVE-2023-6176",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6176"
},
{
"cve": "CVE-2023-6228",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6228"
},
{
"cve": "CVE-2023-6237",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6237"
},
{
"cve": "CVE-2023-6240",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6240"
},
{
"cve": "CVE-2023-6531",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6531"
},
{
"cve": "CVE-2023-6546",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6546"
},
{
"cve": "CVE-2023-6622",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6622"
},
{
"cve": "CVE-2023-6915",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6915"
},
{
"cve": "CVE-2023-6931",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6931"
},
{
"cve": "CVE-2023-6932",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6932"
},
{
"cve": "CVE-2023-7008",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-7008"
},
{
"cve": "CVE-2024-0565",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-0565"
},
{
"cve": "CVE-2024-0727",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-0841",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-0841"
},
{
"cve": "CVE-2024-1085",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1085"
},
{
"cve": "CVE-2024-1086",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1086"
},
{
"cve": "CVE-2024-1394",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1394"
},
{
"cve": "CVE-2024-1488",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1488"
},
{
"cve": "CVE-2024-21011",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21011"
},
{
"cve": "CVE-2024-21012",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21012"
},
{
"cve": "CVE-2024-21068",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21068"
},
{
"cve": "CVE-2024-21085",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21085"
},
{
"cve": "CVE-2024-21094",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-21094"
},
{
"cve": "CVE-2024-22365",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-22365"
},
{
"cve": "CVE-2024-24783",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24783"
},
{
"cve": "CVE-2024-24784",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24784"
},
{
"cve": "CVE-2024-24785",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24785"
},
{
"cve": "CVE-2024-24786",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-25062",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-25062"
},
{
"cve": "CVE-2024-25742",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-25742"
},
{
"cve": "CVE-2024-25743",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-25743"
},
{
"cve": "CVE-2024-26582",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26582"
},
{
"cve": "CVE-2024-26583",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26583"
},
{
"cve": "CVE-2024-26584",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26584"
},
{
"cve": "CVE-2024-26585",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26585"
},
{
"cve": "CVE-2024-26586",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26593",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26593"
},
{
"cve": "CVE-2024-26602",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26602"
},
{
"cve": "CVE-2024-26609",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26609"
},
{
"cve": "CVE-2024-26633",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-26633"
},
{
"cve": "CVE-2024-27316",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-27316"
},
{
"cve": "CVE-2024-28834",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29180",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-29180"
},
{
"cve": "CVE-2024-2961",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-33599",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"product_status": {
"known_affected": [
"T035679",
"T037618",
"T038901",
"67646",
"T040822",
"T035034",
"T035698",
"T035036",
"T035431",
"T027759",
"T033270",
"T040215",
"398363",
"T040597",
"T048677",
"T048676",
"T048675",
"T033787",
"T036959",
"T036993",
"T037940",
"T035142",
"T032255",
"T035047",
"T000126",
"T043834"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-33602"
}
]
}
GHSA-3F9Q-R2PW-87VM
Vulnerability from github – Published: 2023-08-22 21:30 – Updated: 2024-04-04 07:06
VLAI?
Details
libjpeg-turbo version 2.0.90 is vulnerable to a heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c.
Severity ?
9.8 (Critical)
{
"affected": [],
"aliases": [
"CVE-2021-29390"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-08-22T19:16:20Z",
"severity": "HIGH"
},
"details": "libjpeg-turbo version 2.0.90 is vulnerable to a heap-buffer-overflow vulnerability in decompress_smooth_data in jdcoefct.c.",
"id": "GHSA-3f9q-r2pw-87vm",
"modified": "2024-04-04T07:06:22Z",
"published": "2023-08-22T21:30:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29390"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797"
},
{
"type": "WEB",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"
},
{
"type": "WEB",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2021-29390
Vulnerability from fkie_nvd - Published: 2023-08-22 19:16 - Updated: 2024-11-21 06:01
Severity ?
Summary
libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=1943797 | Issue Tracking, Permissions Required | |
| cve@mitre.org | https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595 | Issue Tracking | |
| cve@mitre.org | https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c | Patch | |
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ | ||
| cve@mitre.org | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1943797 | Issue Tracking, Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595 | Issue Tracking | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/ |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| libjpeg-turbo | libjpeg-turbo | 2.0.90 | |
| fedoraproject | fedora | 37 | |
| fedoraproject | fedora | 38 | |
| fedoraproject | fedora | 39 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.90:*:*:*:*:*:*:*",
"matchCriteriaId": "AA5809B6-0C5C-44C6-A2BF-4CE81A4D9200",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c."
},
{
"lang": "es",
"value": "libjpeg-turbo versi\u00f3n 2.0.90 tiene una sobrelectura del b\u00fafer (2 bytes) en decompress_smooth_data en jdcoefct.c."
}
],
"id": "CVE-2021-29390",
"lastModified": "2024-11-21T06:01:01.670",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-22T19:16:20.237",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"source": "cve@mitre.org",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2021-29390
Vulnerability from gsd - Updated: 2023-12-13 01:23Details
libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2021-29390",
"id": "GSD-2021-29390"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-29390"
],
"details": "libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c.",
"id": "GSD-2021-29390",
"modified": "2023-12-13T01:23:36.887692Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29390",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797"
},
{
"name": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595",
"refsource": "MISC",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"
},
{
"name": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c",
"refsource": "MISC",
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"
},
{
"name": "FEDORA-2023-d79ff22c5b",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/"
},
{
"name": "FEDORA-2023-3bfb63f6d2",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"name": "FEDORA-2023-b427f54e68",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:2.0.90:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29390"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "libjpeg-turbo version 2.0.90 has a heap-based buffer over-read (2 bytes) in decompress_smooth_data in jdcoefct.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1943797"
},
{
"name": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595",
"refsource": "MISC",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/blob/4e52b66f342a803d3b8099b79607e3158d3a241c/jdcoefct.c#L595"
},
{
"name": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://github.com/libjpeg-turbo/libjpeg-turbo/commits/main/jdcoefct.c"
},
{
"name": "FEDORA-2023-d79ff22c5b",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/"
},
{
"name": "FEDORA-2023-3bfb63f6d2",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T655QF7CQ3DYAMPFV7IECQYGDEUIVVT/"
},
{
"name": "FEDORA-2023-b427f54e68",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2
}
},
"lastModifiedDate": "2023-09-29T18:25Z",
"publishedDate": "2023-08-22T19:16Z"
}
}
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…