Refine your search

105 vulnerabilities found for Fusion by VMware

CVE-2026-22715 (GCVE-0-2026-22715)
Vulnerability from cvelistv5
Published
2026-02-26 18:29
Modified
2026-02-27 17:55
Summary
VMWare Workstation and Fusion contain a logic flaw in the management of network packets.  Known attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM's.  Resolution: To remediate CVE-2026-22715 please upgrade to VMware Workstation or Fusion Version 25H2U1
Impacted products
Vendor Product Version
VMware Workstation Version: 17.0   < 25H2U1
Patch: 25H2U1
Create a notification for this product.
   VMware Fusion Version: 13.0   < 25H2U1
Patch: 25H2U1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-22715",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-02-27T17:55:05.951870Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-923",
                "description": "CWE-923 Improper Restriction of Communication Channel to Intended Endpoints",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-27T17:55:10.640Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "VMware Workstation",
          "platforms": [
            "Linux",
            "Windows"
          ],
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "25H2U1",
              "status": "affected",
              "version": "17.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "25H2U1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "ProductB",
          "platforms": [
            "MacOS"
          ],
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "25H2U1",
              "status": "affected",
              "version": "13.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "25H2U1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Broadcom would like to thank Ao Wang, Yuxiang Yang, Ke Xu, Xuewei Feng, Qi Li, and Xueying Li for reporting this issue to us."
        }
      ],
      "datePublic": "2026-02-26T07:33:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eVMWare Workstation and Fusion contain a logic flaw in the management of network packets.\u0026nbsp;\u003c/p\u003e\u003cp\u003eKnown attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM\u0027s.\u0026nbsp;\u003c/p\u003e\u003cp\u003eResolution: To remediate CVE-2026-22715 please upgrade to VMware Workstation or Fusion Version 25H2U1\u003c/p\u003e"
            }
          ],
          "value": "VMWare Workstation and Fusion contain a logic flaw in the management of network packets.\u00a0\n\nKnown attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM\u0027s.\u00a0\n\nResolution: To remediate CVE-2026-22715 please upgrade to VMware Workstation or Fusion Version 25H2U1"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-26T18:36:41.929Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eTo remediate CVE-2026-22715 please upgrade to VMwate Workstation or Fusion Version 25H2U1\u003c/p\u003e"
            }
          ],
          "value": "To remediate CVE-2026-22715 please upgrade to VMwate Workstation or Fusion Version 25H2U1"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware Workstation/Fusion NAT vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2026-22715",
    "datePublished": "2026-02-26T18:29:14.190Z",
    "dateReserved": "2026-01-09T06:54:36.840Z",
    "dateUpdated": "2026-02-27T17:55:10.640Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41239 (GCVE-0-2025-41239)
Vulnerability from cvelistv5
Published
2025-07-15 18:35
Modified
2025-07-15 18:51
CWE
  • CWE-908 - Use of Uninitialized Resource
Summary
VMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage of an uninitialised memory in vSockets. A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets.
Impacted products
Vendor Product Version
VMware ESXi Version: 8.0   < ESXi80U3f-24784735
Version: 8.0   < ESXi80U2e-24789317
Version: 7.0   < ESXi70U3w-24784741
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41239",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-15T18:51:16.482481Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-15T18:51:58.342Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "ESXi80U3f-24784735",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi80U2e-24789317",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi70U3w-24784741",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Cloud Foundation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.5.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "17.6.4",
              "status": "affected",
              "version": "17.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.6.4",
              "status": "affected",
              "version": "13.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Platform",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.x, 3.x, 2.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Infrastructure",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "3.x, 2.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "Tools",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.0.1.0",
              "status": "affected",
              "version": "13.x.x",
              "versionType": "custom"
            },
            {
              "lessThan": "12.5.3",
              "status": "affected",
              "version": "12.x.x, 11.x.x,",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-07-15T03:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage of an uninitialised memory in vSockets.\u0026nbsp;\u003c/span\u003eA malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "VMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage of an uninitialised memory in vSockets.\u00a0A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-908",
              "description": "CWE-908 Use of Uninitialized Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-15T18:35:03.747Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "vSockets information-disclosure vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2025-41239",
    "datePublished": "2025-07-15T18:35:03.747Z",
    "dateReserved": "2025-04-16T09:30:17.798Z",
    "dateUpdated": "2025-07-15T18:51:58.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41238 (GCVE-0-2025-41238)
Vulnerability from cvelistv5
Published
2025-07-15 18:34
Modified
2026-02-26 17:50
Severity ?
CWE
Summary
VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
Impacted products
Vendor Product Version
VMware ESXi Version: 8.0   < ESXi80U3f-24784735
Version: 8.0   < ESXi80U2e-24789317
Version: 7.0   < ESXi70U3w-24784741
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41238",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-16T03:56:02.745794Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T17:50:39.320Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "ESXi80U3f-24784735",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi80U2e-24789317",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi70U3w-24784741",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Cloud Foundation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.5.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "17.6.4",
              "status": "affected",
              "version": "17.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.6.4",
              "status": "affected",
              "version": "13.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Platform",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.x, 3.x, 2.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Infrastructure",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "3.x, 2.x"
            }
          ]
        }
      ],
      "datePublic": "2025-07-15T03:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-15T18:34:48.818Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "PVSCSI heap-overflow vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2025-41238",
    "datePublished": "2025-07-15T18:34:48.818Z",
    "dateReserved": "2025-04-16T09:30:17.798Z",
    "dateUpdated": "2026-02-26T17:50:39.320Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41237 (GCVE-0-2025-41237)
Vulnerability from cvelistv5
Published
2025-07-15 18:34
Modified
2026-02-26 17:50
Severity ?
CWE
Summary
VMware ESXi, Workstation, and Fusion contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
Impacted products
Vendor Product Version
VMware Cloud Foundation Version: 9.0.0.0, 5.x, 4.5.x
Create a notification for this product.
   VMware vSphere Foundation Version: 9.0.0.0
Create a notification for this product.
   VMware ESXi Version: 8.0   < ESXi80U3f-24784735
Version: 8.0   < ESXi80U2e-24789317
Version: 7.0   < ESXi70U3w-24784741
Create a notification for this product.
   VMware Workstation Version: 17.x   < 17.6.4
Create a notification for this product.
   VMware Fusion Version: 13.x   < 13.6.4
Create a notification for this product.
   VMware Telco Cloud Platform Version: 5.x, 4.x, 3.x, 2.x
Create a notification for this product.
   VMware Telco Cloud Infrastructure Version: 3.x, 2.x
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41237",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-16T03:56:00.503549Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T17:50:39.727Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Cloud Foundation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "9.0.0.0, 5.x, 4.5.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "vSphere Foundation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "9.0.0.0"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "ESXi80U3f-24784735",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi80U2e-24789317",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi70U3w-24784741",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "17.6.4",
              "status": "affected",
              "version": "17.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.6.4",
              "status": "affected",
              "version": "13.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Platform",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.x, 3.x, 2.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Infrastructure",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "3.x, 2.x"
            }
          ]
        }
      ],
      "datePublic": "2025-07-15T03:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi,\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;Workstation, and Fusion\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "VMware ESXi,\u00a0Workstation, and Fusion\u00a0contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-15T18:34:21.083Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMCI integer-underflow vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2025-41237",
    "datePublished": "2025-07-15T18:34:21.083Z",
    "dateReserved": "2025-04-16T09:30:17.798Z",
    "dateUpdated": "2026-02-26T17:50:39.727Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41236 (GCVE-0-2025-41236)
Vulnerability from cvelistv5
Published
2025-07-15 18:34
Modified
2026-02-26 17:50
Severity ?
CWE
Summary
VMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network adapter. A malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual network adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue.
Impacted products
Vendor Product Version
VMware ESXi Version: 8.0   < ESXi80U3f-24784735
Version: 8.0   < ESXi80U2e-24789317
Version: 7.0   < ESXi70U3w-24784741
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41236",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-16T03:55:59.335825Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-02-26T17:50:40.035Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "ESXi80U3f-24784735",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi80U2e-24789317",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi70U3w-24784741",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Cloud Foundation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.5.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "17.6.4",
              "status": "affected",
              "version": "17.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThanOrEqual": "13.6.4",
              "status": "affected",
              "version": "13.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Platform",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.x, 3.x, 2.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Infrastructure",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "3.x, 2.x"
            }
          ]
        }
      ],
      "datePublic": "2025-07-15T03:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network adapter.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual network adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "VMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network adapter.\u00a0A malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual network adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-15T18:34:12.719Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMXNET3 integer-overflow vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2025-41236",
    "datePublished": "2025-07-15T18:34:12.719Z",
    "dateReserved": "2025-04-16T09:30:17.798Z",
    "dateUpdated": "2026-02-26T17:50:40.035Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41227 (GCVE-0-2025-41227)
Vulnerability from cvelistv5
Published
2025-05-20 14:24
Modified
2025-06-24 07:13
CWE
  • CWE-400 - Uncontrolled Resource Consumption
Summary
VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options. A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition.
Impacted products
Vendor Product Version
VMware ESXi Version: 8.0   < ESXi80U3se-24659227
Version: 7.0   < ESXi70U3sv-24723868
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41227",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-20T15:59:41.340433Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-20T16:00:12.860Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "ESXi80U3se-24659227",
              "status": "affected",
              "version": "8.0",
              "versionType": "custom"
            },
            {
              "lessThan": "ESXi70U3sv-24723868",
              "status": "affected",
              "version": "7.0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Cloud Foundation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.5.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Platform",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x, 4.x, 3.x, 2.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Telco Cloud Infrastructure",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "3.x, 2.x"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "17.6.3",
              "status": "affected",
              "version": "17.x",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.6.3",
              "status": "affected",
              "version": "13.x",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2025-05-20T11:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "VMware ESXi,\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eWorkstation, and Fusion contain a denial-of-service vulnerability due to certain guest options.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition.\u003c/span\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "VMware ESXi,\u00a0Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options.\u00a0A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-24T07:13:30.222Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Denial-of-Service Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2025-41227",
    "datePublished": "2025-05-20T14:24:29.316Z",
    "dateReserved": "2025-04-16T09:29:46.972Z",
    "dateUpdated": "2025-06-24T07:13:30.222Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34045 (GCVE-0-2023-34045)
Vulnerability from cvelistv5
Published
2023-10-20 09:00
Modified
2025-03-07 18:25
Summary
VMware Fusion(13.x prior to 13.5) contains a local privilege escalation vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.
Impacted products
Vendor Product Version
VMware Fusion Version: 13.x
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:01:52.416Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34045",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-06T15:26:55.835802Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-07T18:25:05.584Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.5",
              "status": "affected",
              "version": "13.x",
              "versionType": "13.5"
            }
          ]
        }
      ],
      "datePublic": "2023-10-19T18:29:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "VMware Fusion(13.x prior to 13.5)\u0026nbsp;contains a local privilege escalation vulnerability that occurs during \ninstallation for the first time (the user needs to drag or copy the \napplication to a folder from the \u0027.dmg\u0027 volume) or when installing an \nupgrade.\u0026nbsp;A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time."
            }
          ],
          "value": "VMware Fusion(13.x prior to 13.5)\u00a0contains a local privilege escalation vulnerability that occurs during \ninstallation for the first time (the user needs to drag or copy the \napplication to a folder from the \u0027.dmg\u0027 volume) or when installing an \nupgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-20T09:00:30.352Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware Fusion installer local privilege escalation",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-34045",
    "datePublished": "2023-10-20T09:00:30.352Z",
    "dateReserved": "2023-05-25T17:21:56.202Z",
    "dateUpdated": "2025-03-07T18:25:05.584Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34046 (GCVE-0-2023-34046)
Vulnerability from cvelistv5
Published
2023-10-20 08:59
Modified
2025-03-07 18:27
Summary
VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during installation for the first time (the user needs to drag or copy the application to a folder from the '.dmg' volume) or when installing an upgrade. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed or being installed for the first time.
Impacted products
Vendor Product Version
VMware Fusion Version: 13.x
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:01:52.426Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34046",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-06T15:26:58.702904Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-367",
                "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-07T18:27:07.211Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.5",
              "status": "affected",
              "version": "13.x",
              "versionType": "13.5"
            }
          ]
        }
      ],
      "datePublic": "2023-10-19T18:29:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) \nvulnerability that occurs during installation for the first time (the \nuser needs to drag or copy the application to a folder from the \u0027.dmg\u0027 \nvolume) or when installing an upgrade.\u0026nbsp;A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time."
            }
          ],
          "value": "VMware Fusion(13.x prior to 13.5) contains a TOCTOU (Time-of-check Time-of-use) \nvulnerability that occurs during installation for the first time (the \nuser needs to drag or copy the application to a folder from the \u0027.dmg\u0027 \nvolume) or when installing an upgrade.\u00a0A malicious actor with local non-administrative user privileges may \nexploit this vulnerability to escalate privileges to root on the system \nwhere Fusion is installed or being installed for the first time."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-20T08:59:08.671Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware Fusion TOCTOU local privilege escalation vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-34046",
    "datePublished": "2023-10-20T08:59:08.671Z",
    "dateReserved": "2023-05-25T17:21:56.202Z",
    "dateUpdated": "2025-03-07T18:27:07.211Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-34044 (GCVE-0-2023-34044)
Vulnerability from cvelistv5
Published
2023-10-20 08:56
Modified
2024-08-02 16:01
Summary
VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds read vulnerability that exists in the functionality for sharing host Bluetooth devices with the virtual machine. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T16:01:52.395Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "MacOS",
            "Linux",
            "iOS",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit"
          ],
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "17.5",
              "status": "affected",
              "version": "17.x",
              "versionType": "17.5"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "MacOS"
          ],
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "13.5",
              "status": "affected",
              "version": "13.x",
              "versionType": "13.5"
            }
          ]
        }
      ],
      "datePublic": "2023-10-19T18:29:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds \nread vulnerability that exists in the functionality for sharing host \nBluetooth devices with the virtual machine.\u0026nbsp;A malicious actor with local administrative privileges on a virtual \nmachine may be able to read privileged information contained in \nhypervisor memory from a virtual machine."
            }
          ],
          "value": "VMware Workstation( 17.x prior to 17.5) and Fusion(13.x prior to 13.5) contain an out-of-bounds \nread vulnerability that exists in the functionality for sharing host \nBluetooth devices with the virtual machine.\u00a0A malicious actor with local administrative privileges on a virtual \nmachine may be able to read privileged information contained in \nhypervisor memory from a virtual machine."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-20T08:56:53.136Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Information disclosure vulnerability in bluetooth device-sharing functionality",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-34044",
    "datePublished": "2023-10-20T08:56:53.136Z",
    "dateReserved": "2023-05-25T17:21:56.202Z",
    "dateUpdated": "2024-08-02T16:01:52.395Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3971 (GCVE-0-2020-3971)
Vulnerability from cvelistv5
Published
2020-06-25 14:55
Modified
2024-08-04 07:52
Severity ?
CWE
  • Heap overflow vulnerability
Summary
VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory.
References
Impacted products
Vendor Product Version
VMware VMware ESXi Version: 6.7 before ESXi670-201904101-SG
Version: 6.5 before ESXi650-201907101-SG
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:20.541Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "6.7 before ESXi670-201904101-SG"
            },
            {
              "status": "affected",
              "version": "6.5 before ESXi650-201907101-SG"
            }
          ]
        },
        {
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "15.x before 15.0.2"
            }
          ]
        },
        {
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "11.x before 11.0.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Heap overflow vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-06-25T14:55:33.000Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2020-3971",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware ESXi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.7 before ESXi670-201904101-SG"
                          },
                          {
                            "version_value": "6.5 before ESXi650-201907101-SG"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Workstation",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "15.x before 15.0.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Fusion",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "11.x before 11.0.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201907101-SG), Workstation (15.x before 15.0.2), and Fusion (11.x before 11.0.2) contain a heap overflow vulnerability in the vmxnet3 virtual network adapter. A malicious actor with local access to a virtual machine with a vmxnet3 network adapter present may be able to read privileged information contained in physical memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Heap overflow vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html",
              "refsource": "CONFIRM",
              "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2020-3971",
    "datePublished": "2020-06-25T14:55:33.000Z",
    "dateReserved": "2019-12-30T00:00:00.000Z",
    "dateUpdated": "2024-08-04T07:52:20.541Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3965 (GCVE-0-2020-3965)
Vulnerability from cvelistv5
Published
2020-06-25 14:54
Modified
2024-08-04 07:52
Severity ?
CWE
  • Information Leak
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.
Impacted products
Vendor Product Version
VMware VMware ESXi Version: 7.0 before ESXi_7.0.0-1.20.16321839
Version: 6.7 before ESXi670-202006401-SG
Version: 6.5 before ESXi650-202005401-SG
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:20.544Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
          },
          {
            "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2020/Jul/22"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "7.0 before ESXi_7.0.0-1.20.16321839"
            },
            {
              "status": "affected",
              "version": "6.7 before ESXi670-202006401-SG"
            },
            {
              "status": "affected",
              "version": "6.5 before ESXi650-202005401-SG"
            }
          ]
        },
        {
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "15.x before 15.5.2"
            }
          ]
        },
        {
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "11.x before 11.5.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-17T20:06:09.000Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
        },
        {
          "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2020/Jul/22"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2020-3965",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware ESXi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "7.0 before ESXi_7.0.0-1.20.16321839"
                          },
                          {
                            "version_value": "6.7 before ESXi670-202006401-SG"
                          },
                          {
                            "version_value": "6.5 before ESXi650-202005401-SG"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Workstation",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "15.x before 15.5.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Fusion",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "11.x before 11.5.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the XHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html",
              "refsource": "CONFIRM",
              "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
            },
            {
              "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2020/Jul/22"
            },
            {
              "name": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2020-3965",
    "datePublished": "2020-06-25T14:54:46.000Z",
    "dateReserved": "2019-12-30T00:00:00.000Z",
    "dateUpdated": "2024-08-04T07:52:20.544Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3964 (GCVE-0-2020-3964)
Vulnerability from cvelistv5
Published
2020-06-25 14:51
Modified
2024-08-04 07:52
Severity ?
CWE
  • Information Leak
Summary
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor's memory. Additional conditions beyond the attacker's control need to be present for exploitation to be possible.
Impacted products
Vendor Product Version
VMware VMware ESXi Version: 7.0 before ESXi_7.0.0-1.20.16321839
Version: 6.7 before ESXi670-202006401-SG
Version: 6.5 before ESXi650-202005401-SG
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:20.578Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
          },
          {
            "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2020/Jul/22"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "7.0 before ESXi_7.0.0-1.20.16321839"
            },
            {
              "status": "affected",
              "version": "6.7 before ESXi670-202006401-SG"
            },
            {
              "status": "affected",
              "version": "6.5 before ESXi650-202005401-SG"
            }
          ]
        },
        {
          "product": "Workstation",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "15.x before 15.5.2"
            }
          ]
        },
        {
          "product": "Fusion",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "11.x before 11.5.2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor\u0027s memory. Additional conditions beyond the attacker\u0027s control need to be present for exploitation to be possible."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Leak",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-17T20:06:10.000Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
        },
        {
          "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2020/Jul/22"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2020-3964",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware ESXi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "7.0 before ESXi_7.0.0-1.20.16321839"
                          },
                          {
                            "version_value": "6.7 before ESXi670-202006401-SG"
                          },
                          {
                            "version_value": "6.5 before ESXi650-202005401-SG"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Workstation",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "15.x before 15.5.2"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Fusion",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "11.x before 11.5.2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor\u0027s memory. Additional conditions beyond the attacker\u0027s control need to be present for exploitation to be possible."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Leak"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html",
              "refsource": "CONFIRM",
              "url": "https://www.vmware.com/security/advisories/VMSA-2020-0015.html"
            },
            {
              "name": "20200717 VMware ESXi: Multiple vulnerabilities [CVE-2020-3963, CVE-2020-3964, CVE-2020-3965, CVE-2020-3960]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2020/Jul/22"
            },
            {
              "name": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2020-3964",
    "datePublished": "2020-06-25T14:51:48.000Z",
    "dateReserved": "2019-12-30T00:00:00.000Z",
    "dateUpdated": "2024-08-04T07:52:20.578Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CERTFR-2026-AVI-0218
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
VMware Tanzu Kubernetes Runtime Platform Services pour Tanzu Platform versions antérieures à 10.3.5
VMware Tanzu Kubernetes Runtime Tanzu Hub versions antérieures à 10.3.5
VMware Tanzu Data Intelligence Tanzu pour Postgres versions 16.x antérieures à 16.12.0
VMware Tanzu Data Intelligence Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes
VMware Tanzu Data Intelligence Tanzu pour Postgres versions 18.x antérieures à 18.2.0
VMware Tanzu Kubernetes Runtime Stemcells (Ubuntu Noble) versions antérieures à 1.238.x
VMware Workstation Workstation versions antérieures à 25H2u1
VMware Fusion Fusion versions antérieures à 25H2u1 sur MacOS
VMware Tanzu Kubernetes Runtime Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x
VMware Tanzu Data Intelligence Tanzu pour Postgres versions 15.x antérieures à 15.16.0
VMware Tanzu Kubernetes Runtime Stemcells (Windows) versions antérieures à 2019.95.x
VMware Tanzu Data Intelligence Tanzu pour Postgres versions 17.x antérieures à 17.8.0
VMware Tanzu Data Intelligence Tanzu pour Postgres versions antérieures à 14.21.0
References
Bulletin de sécurité VMware 37096 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37092 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37102 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37078 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37109 2026-02-26 vendor-advisory
Bulletin de sécurité VMware 37087 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37090 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37077 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37098 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37079 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37101 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37104 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37080 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37097 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37083 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37086 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37082 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37100 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37099 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37081 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37089 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37076 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37088 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 36986 2026-02-26 vendor-advisory
Bulletin de sécurité VMware DSA-2025-27 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37084 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37110 2026-02-26 vendor-advisory
Bulletin de sécurité VMware 37093 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37085 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37095 2026-02-25 vendor-advisory
Bulletin de sécurité VMware 37094 2026-02-25 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Tanzu Kubernetes Runtime",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
      "product": {
        "name": "Tanzu Kubernetes Runtime",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
      "product": {
        "name": "Tanzu Data Intelligence",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
      "product": {
        "name": "Tanzu Data Intelligence",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
      "product": {
        "name": "Tanzu Data Intelligence",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells (Ubuntu Noble)  versions ant\u00e9rieures \u00e0 1.238.x",
      "product": {
        "name": "Tanzu Kubernetes Runtime",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
      "product": {
        "name": "Workstation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
      "product": {
        "name": "Tanzu Kubernetes Runtime",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
      "product": {
        "name": "Tanzu Data Intelligence",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
      "product": {
        "name": "Tanzu Kubernetes Runtime",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
      "product": {
        "name": "Tanzu Data Intelligence",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
      "product": {
        "name": "Tanzu Data Intelligence",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2008-0888",
      "url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
    },
    {
      "name": "CVE-2014-8140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
    },
    {
      "name": "CVE-2014-8139",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
    },
    {
      "name": "CVE-2014-8141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
    },
    {
      "name": "CVE-2015-4779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
    },
    {
      "name": "CVE-2015-4780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
    },
    {
      "name": "CVE-2015-4787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
    },
    {
      "name": "CVE-2015-4790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
    },
    {
      "name": "CVE-2015-4778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
    },
    {
      "name": "CVE-2015-4782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
    },
    {
      "name": "CVE-2015-4789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
    },
    {
      "name": "CVE-2015-4764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
    },
    {
      "name": "CVE-2015-4783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
    },
    {
      "name": "CVE-2015-2583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
    },
    {
      "name": "CVE-2015-4781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
    },
    {
      "name": "CVE-2015-4776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
    },
    {
      "name": "CVE-2015-4786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
    },
    {
      "name": "CVE-2015-2656",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
    },
    {
      "name": "CVE-2015-4788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
    },
    {
      "name": "CVE-2015-4785",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
    },
    {
      "name": "CVE-2015-4754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
    },
    {
      "name": "CVE-2015-4775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
    },
    {
      "name": "CVE-2015-4777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
    },
    {
      "name": "CVE-2015-2640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
    },
    {
      "name": "CVE-2015-4774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
    },
    {
      "name": "CVE-2015-2626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
    },
    {
      "name": "CVE-2015-2624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
    },
    {
      "name": "CVE-2015-4784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
    },
    {
      "name": "CVE-2015-2654",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
    },
    {
      "name": "CVE-2016-9840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
    },
    {
      "name": "CVE-2016-9843",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
    },
    {
      "name": "CVE-2020-11023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
    },
    {
      "name": "CVE-2019-25013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
    },
    {
      "name": "CVE-2019-13232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
    },
    {
      "name": "CVE-2021-30560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
    },
    {
      "name": "CVE-2020-10878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
    },
    {
      "name": "CVE-2021-22901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
    },
    {
      "name": "CVE-2020-10543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
    },
    {
      "name": "CVE-2020-12723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
    },
    {
      "name": "CVE-2020-10029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
    },
    {
      "name": "CVE-2013-0340",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
    },
    {
      "name": "CVE-2021-37972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
    },
    {
      "name": "CVE-2021-3520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
    },
    {
      "name": "CVE-2021-3421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
    },
    {
      "name": "CVE-2021-3326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
    },
    {
      "name": "CVE-2019-2708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
    },
    {
      "name": "CVE-2020-27618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
    },
    {
      "name": "CVE-2021-22926",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
    },
    {
      "name": "CVE-2021-22947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
    },
    {
      "name": "CVE-2021-22945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
    },
    {
      "name": "CVE-2021-22946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
    },
    {
      "name": "CVE-2021-36976",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
    },
    {
      "name": "CVE-2022-37434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
    },
    {
      "name": "CVE-2022-2309",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
    },
    {
      "name": "CVE-2022-29824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
    },
    {
      "name": "CVE-2022-23308",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
    },
    {
      "name": "CVE-2022-40303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
    },
    {
      "name": "CVE-2022-40304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
    },
    {
      "name": "CVE-2022-29526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
    },
    {
      "name": "CVE-2022-34903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
    },
    {
      "name": "CVE-2022-3515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
    },
    {
      "name": "CVE-2022-32205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
    },
    {
      "name": "CVE-2022-32206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
    },
    {
      "name": "CVE-2018-25032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
    },
    {
      "name": "CVE-2022-23990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
    },
    {
      "name": "CVE-2022-25236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
    },
    {
      "name": "CVE-2021-22924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
    },
    {
      "name": "CVE-2021-22897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
    },
    {
      "name": "CVE-2021-22925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
    },
    {
      "name": "CVE-2021-22923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
    },
    {
      "name": "CVE-2021-22898",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
    },
    {
      "name": "CVE-2021-22922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
    },
    {
      "name": "CVE-2018-18384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
    },
    {
      "name": "CVE-2020-12762",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
    },
    {
      "name": "CVE-2021-20266",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
    },
    {
      "name": "CVE-2022-29155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
    },
    {
      "name": "CVE-2022-0530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
    },
    {
      "name": "CVE-2021-3521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
    },
    {
      "name": "CVE-2022-27774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
    },
    {
      "name": "CVE-2022-27775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
    },
    {
      "name": "CVE-2022-22576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
    },
    {
      "name": "CVE-2022-27776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
    },
    {
      "name": "CVE-2017-7500",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
    },
    {
      "name": "CVE-2021-33574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
    },
    {
      "name": "CVE-2017-11164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
    },
    {
      "name": "CVE-2021-3999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
    },
    {
      "name": "CVE-2022-23218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
    },
    {
      "name": "CVE-2022-23219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
    },
    {
      "name": "CVE-2022-27782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
    },
    {
      "name": "CVE-2022-38476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
    },
    {
      "name": "CVE-2022-26488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
    },
    {
      "name": "CVE-2022-32208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
    },
    {
      "name": "CVE-2022-27781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
    },
    {
      "name": "CVE-2022-32207",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
    },
    {
      "name": "CVE-2022-1271",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
    },
    {
      "name": "CVE-2022-29458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
    },
    {
      "name": "CVE-2021-39537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
    },
    {
      "name": "CVE-2022-32221",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
    },
    {
      "name": "CVE-2022-35252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
    },
    {
      "name": "CVE-2022-43551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
    },
    {
      "name": "CVE-2022-43552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
    },
    {
      "name": "CVE-2022-40897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
    },
    {
      "name": "CVE-2023-0767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
    },
    {
      "name": "CVE-2022-1586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
    },
    {
      "name": "CVE-2023-23916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
    },
    {
      "name": "CVE-2021-46828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
    },
    {
      "name": "CVE-2022-33070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
    },
    {
      "name": "CVE-2022-47629",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
    },
    {
      "name": "CVE-2023-29469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
    },
    {
      "name": "CVE-2023-28484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
    },
    {
      "name": "CVE-2022-38533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
    },
    {
      "name": "CVE-2023-27535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
    },
    {
      "name": "CVE-2022-36227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
    },
    {
      "name": "CVE-2023-27533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
    },
    {
      "name": "CVE-2023-27538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
    },
    {
      "name": "CVE-2023-27534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
    },
    {
      "name": "CVE-2023-27536",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
    },
    {
      "name": "CVE-2020-1752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
    },
    {
      "name": "CVE-2022-28391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
    },
    {
      "name": "CVE-2021-35942",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
    },
    {
      "name": "CVE-2021-38604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
    },
    {
      "name": "CVE-2020-29562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
    },
    {
      "name": "CVE-2021-27645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
    },
    {
      "name": "CVE-2021-3998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
    },
    {
      "name": "CVE-2023-28322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
    },
    {
      "name": "CVE-2023-28320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
    },
    {
      "name": "CVE-2023-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
    },
    {
      "name": "CVE-2023-1999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
    },
    {
      "name": "CVE-2023-28319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
    },
    {
      "name": "CVE-2023-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
    },
    {
      "name": "CVE-2023-4863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
    },
    {
      "name": "CVE-2023-40403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
    },
    {
      "name": "CVE-2023-4911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
    },
    {
      "name": "CVE-2023-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
    },
    {
      "name": "CVE-2023-38545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
    },
    {
      "name": "CVE-2023-30774",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
    },
    {
      "name": "CVE-2023-45853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
    },
    {
      "name": "CVE-2023-45803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
    },
    {
      "name": "CVE-2023-2603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
    },
    {
      "name": "CVE-2023-2602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
    },
    {
      "name": "CVE-2023-4527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
    },
    {
      "name": "CVE-2023-4813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
    },
    {
      "name": "CVE-2023-4806",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
    },
    {
      "name": "CVE-2022-48303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
    },
    {
      "name": "CVE-2022-41409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
    },
    {
      "name": "CVE-2022-0563",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
    },
    {
      "name": "CVE-2023-32643",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
    },
    {
      "name": "CVE-2021-43396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
    },
    {
      "name": "CVE-2023-0687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
    },
    {
      "name": "CVE-2023-5156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
    },
    {
      "name": "CVE-2023-29491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
    },
    {
      "name": "CVE-2023-32665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
    },
    {
      "name": "CVE-2023-39615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
    },
    {
      "name": "CVE-2021-46848",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
    },
    {
      "name": "CVE-2021-43618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
    },
    {
      "name": "CVE-2023-45322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
    },
    {
      "name": "CVE-2023-29499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
    },
    {
      "name": "CVE-2022-28321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
    },
    {
      "name": "CVE-2021-32292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
    },
    {
      "name": "CVE-2021-46195",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
    },
    {
      "name": "CVE-2013-4235",
      "url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
    },
    {
      "name": "CVE-2023-32611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
    },
    {
      "name": "CVE-2023-29383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
    },
    {
      "name": "CVE-2023-32636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
    },
    {
      "name": "CVE-2024-20696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
    },
    {
      "name": "CVE-2024-0743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
    },
    {
      "name": "CVE-2023-31484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
    },
    {
      "name": "CVE-2023-25588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
    },
    {
      "name": "CVE-2023-32573",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
    },
    {
      "name": "CVE-2023-30086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
    },
    {
      "name": "CVE-2023-26965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
    },
    {
      "name": "CVE-2023-3316",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
    },
    {
      "name": "CVE-2023-2804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
    },
    {
      "name": "CVE-2023-46218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
    },
    {
      "name": "CVE-2023-47038",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
    },
    {
      "name": "CVE-2022-48554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
    },
    {
      "name": "CVE-2023-5388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
    },
    {
      "name": "CVE-2023-36632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
    },
    {
      "name": "CVE-2024-28085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
    },
    {
      "name": "CVE-2024-26256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
    },
    {
      "name": "CVE-2020-22916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
    },
    {
      "name": "CVE-2017-7501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
    },
    {
      "name": "CVE-2021-35939",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
    },
    {
      "name": "CVE-2021-35938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
    },
    {
      "name": "CVE-2021-35937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
    },
    {
      "name": "CVE-2023-52426",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
    },
    {
      "name": "CVE-2023-52425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
    },
    {
      "name": "CVE-2024-4603",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
    },
    {
      "name": "CVE-2023-31486",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
    },
    {
      "name": "CVE-2024-4741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
    },
    {
      "name": "CVE-2025-38322",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
    },
    {
      "name": "CVE-2025-38347",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
    },
    {
      "name": "CVE-2025-38552",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
    },
    {
      "name": "CVE-2025-38614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
    },
    {
      "name": "CVE-2025-38676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
    },
    {
      "name": "CVE-2025-38677",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
    },
    {
      "name": "CVE-2025-38679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
    },
    {
      "name": "CVE-2025-38680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
    },
    {
      "name": "CVE-2025-38681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
    },
    {
      "name": "CVE-2025-38683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
    },
    {
      "name": "CVE-2025-38684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
    },
    {
      "name": "CVE-2025-38685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
    },
    {
      "name": "CVE-2025-38687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
    },
    {
      "name": "CVE-2025-38691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
    },
    {
      "name": "CVE-2025-38693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
    },
    {
      "name": "CVE-2025-38694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
    },
    {
      "name": "CVE-2025-38695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
    },
    {
      "name": "CVE-2025-38696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
    },
    {
      "name": "CVE-2025-38697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
    },
    {
      "name": "CVE-2025-38698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
    },
    {
      "name": "CVE-2025-38699",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
    },
    {
      "name": "CVE-2025-38700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
    },
    {
      "name": "CVE-2025-38701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
    },
    {
      "name": "CVE-2025-38702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
    },
    {
      "name": "CVE-2025-38706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
    },
    {
      "name": "CVE-2025-38707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
    },
    {
      "name": "CVE-2025-38708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
    },
    {
      "name": "CVE-2025-38711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
    },
    {
      "name": "CVE-2025-38712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
    },
    {
      "name": "CVE-2025-38713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
    },
    {
      "name": "CVE-2025-38714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
    },
    {
      "name": "CVE-2025-38715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
    },
    {
      "name": "CVE-2025-38721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
    },
    {
      "name": "CVE-2025-38724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
    },
    {
      "name": "CVE-2025-38725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
    },
    {
      "name": "CVE-2025-38728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
    },
    {
      "name": "CVE-2025-38729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
    },
    {
      "name": "CVE-2025-38730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
    },
    {
      "name": "CVE-2025-38732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
    },
    {
      "name": "CVE-2025-38734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
    },
    {
      "name": "CVE-2025-38735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
    },
    {
      "name": "CVE-2025-39673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
    },
    {
      "name": "CVE-2025-39675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
    },
    {
      "name": "CVE-2025-39676",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
    },
    {
      "name": "CVE-2025-39679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
    },
    {
      "name": "CVE-2025-39681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
    },
    {
      "name": "CVE-2025-39683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
    },
    {
      "name": "CVE-2025-39684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
    },
    {
      "name": "CVE-2025-39685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
    },
    {
      "name": "CVE-2025-39686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
    },
    {
      "name": "CVE-2025-39687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
    },
    {
      "name": "CVE-2025-39689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
    },
    {
      "name": "CVE-2025-39691",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
    },
    {
      "name": "CVE-2025-39692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
    },
    {
      "name": "CVE-2025-39693",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
    },
    {
      "name": "CVE-2025-39694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
    },
    {
      "name": "CVE-2025-39698",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
    },
    {
      "name": "CVE-2025-39701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
    },
    {
      "name": "CVE-2025-39702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
    },
    {
      "name": "CVE-2025-39703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
    },
    {
      "name": "CVE-2025-39705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
    },
    {
      "name": "CVE-2025-39706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
    },
    {
      "name": "CVE-2025-39707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
    },
    {
      "name": "CVE-2025-39709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
    },
    {
      "name": "CVE-2025-39710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
    },
    {
      "name": "CVE-2025-39711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
    },
    {
      "name": "CVE-2025-39712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
    },
    {
      "name": "CVE-2025-39713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
    },
    {
      "name": "CVE-2025-39714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
    },
    {
      "name": "CVE-2025-39715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
    },
    {
      "name": "CVE-2025-39716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
    },
    {
      "name": "CVE-2025-39718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
    },
    {
      "name": "CVE-2025-39719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
    },
    {
      "name": "CVE-2025-39720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
    },
    {
      "name": "CVE-2025-39721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
    },
    {
      "name": "CVE-2025-39724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
    },
    {
      "name": "CVE-2025-39736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
    },
    {
      "name": "CVE-2025-39737",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
    },
    {
      "name": "CVE-2025-39738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
    },
    {
      "name": "CVE-2025-39742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
    },
    {
      "name": "CVE-2025-39743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
    },
    {
      "name": "CVE-2025-39749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
    },
    {
      "name": "CVE-2025-39752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
    },
    {
      "name": "CVE-2025-39756",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
    },
    {
      "name": "CVE-2025-39757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
    },
    {
      "name": "CVE-2025-39759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
    },
    {
      "name": "CVE-2025-39760",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
    },
    {
      "name": "CVE-2025-39766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
    },
    {
      "name": "CVE-2025-39770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
    },
    {
      "name": "CVE-2025-39772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
    },
    {
      "name": "CVE-2025-39773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
    },
    {
      "name": "CVE-2025-39776",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
    },
    {
      "name": "CVE-2025-39779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
    },
    {
      "name": "CVE-2025-39781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
    },
    {
      "name": "CVE-2025-39782",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
    },
    {
      "name": "CVE-2025-39783",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
    },
    {
      "name": "CVE-2025-39787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
    },
    {
      "name": "CVE-2025-39788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
    },
    {
      "name": "CVE-2025-39790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
    },
    {
      "name": "CVE-2025-39794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
    },
    {
      "name": "CVE-2025-39795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
    },
    {
      "name": "CVE-2025-39798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
    },
    {
      "name": "CVE-2025-39800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
    },
    {
      "name": "CVE-2025-39801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
    },
    {
      "name": "CVE-2025-38039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
    },
    {
      "name": "CVE-2025-38101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
    },
    {
      "name": "CVE-2025-38156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
    },
    {
      "name": "CVE-2025-38164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
    },
    {
      "name": "CVE-2025-38169",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
    },
    {
      "name": "CVE-2025-38269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
    },
    {
      "name": "CVE-2025-38274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
    },
    {
      "name": "CVE-2025-38278",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
    },
    {
      "name": "CVE-2025-38295",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
    },
    {
      "name": "CVE-2025-38514",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
    },
    {
      "name": "CVE-2025-38542",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
    },
    {
      "name": "CVE-2025-38569",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
    },
    {
      "name": "CVE-2025-39890",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
    },
    {
      "name": "CVE-2025-9231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
    },
    {
      "name": "CVE-2025-38511",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
    },
    {
      "name": "CVE-2025-38521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
    },
    {
      "name": "CVE-2025-38668",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
    },
    {
      "name": "CVE-2025-9230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
    },
    {
      "name": "CVE-2025-38527",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
    },
    {
      "name": "CVE-2025-38718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
    },
    {
      "name": "CVE-2025-8291",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
    },
    {
      "name": "CVE-2025-39730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
    },
    {
      "name": "CVE-2025-39761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
    },
    {
      "name": "CVE-2024-28757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
    },
    {
      "name": "CVE-2024-5535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
    },
    {
      "name": "CVE-2024-36331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
    },
    {
      "name": "CVE-2025-38501",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
    },
    {
      "name": "CVE-2025-38539",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
    },
    {
      "name": "CVE-2025-38561",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
    },
    {
      "name": "CVE-2025-38562",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
    },
    {
      "name": "CVE-2025-38574",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
    },
    {
      "name": "CVE-2025-38577",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
    },
    {
      "name": "CVE-2025-38578",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
    },
    {
      "name": "CVE-2025-38579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
    },
    {
      "name": "CVE-2025-38622",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
    },
    {
      "name": "CVE-2025-38623",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
    },
    {
      "name": "CVE-2025-38639",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
    },
    {
      "name": "CVE-2025-38645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
    },
    {
      "name": "CVE-2025-38652",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
    },
    {
      "name": "CVE-2025-38653",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
    },
    {
      "name": "CVE-2025-38664",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
    },
    {
      "name": "CVE-2025-39731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
    },
    {
      "name": "CVE-2025-39734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
    },
    {
      "name": "CVE-2025-39869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
    },
    {
      "name": "CVE-2021-36770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
    },
    {
      "name": "CVE-2025-39873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
    },
    {
      "name": "CVE-2025-39876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
    },
    {
      "name": "CVE-2025-39880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
    },
    {
      "name": "CVE-2025-39883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
    },
    {
      "name": "CVE-2025-39885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
    },
    {
      "name": "CVE-2023-5752",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
    },
    {
      "name": "CVE-2024-3651",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
    },
    {
      "name": "CVE-2025-39907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
    },
    {
      "name": "CVE-2025-39911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
    },
    {
      "name": "CVE-2025-39913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
    },
    {
      "name": "CVE-2025-39923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
    },
    {
      "name": "CVE-2024-2398",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
    },
    {
      "name": "CVE-2024-4032",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
    },
    {
      "name": "CVE-2024-5642",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
    },
    {
      "name": "CVE-2025-41254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
    },
    {
      "name": "CVE-2022-50247",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
    },
    {
      "name": "CVE-2022-50249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
    },
    {
      "name": "CVE-2022-50250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
    },
    {
      "name": "CVE-2024-25062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
    },
    {
      "name": "CVE-2024-28834",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
    },
    {
      "name": "CVE-2024-2961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
    },
    {
      "name": "CVE-2024-33599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
    },
    {
      "name": "CVE-2024-33600",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
    },
    {
      "name": "CVE-2024-33601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
    },
    {
      "name": "CVE-2024-33602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
    },
    {
      "name": "CVE-2022-50444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
    },
    {
      "name": "CVE-2022-50458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
    },
    {
      "name": "CVE-2023-53182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
    },
    {
      "name": "CVE-2023-39804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
    },
    {
      "name": "CVE-2023-4641",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
    },
    {
      "name": "CVE-2023-50495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
    },
    {
      "name": "CVE-2024-22365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
    },
    {
      "name": "CVE-2025-38255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
    },
    {
      "name": "CVE-2025-38402",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
    },
    {
      "name": "CVE-2025-38408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
    },
    {
      "name": "CVE-2025-38526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
    },
    {
      "name": "CVE-2025-38533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
    },
    {
      "name": "CVE-2025-38544",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
    },
    {
      "name": "CVE-2025-38584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
    },
    {
      "name": "CVE-2025-38590",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
    },
    {
      "name": "CVE-2025-38593",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
    },
    {
      "name": "CVE-2025-38595",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
    },
    {
      "name": "CVE-2025-38640",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
    },
    {
      "name": "CVE-2025-38659",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
    },
    {
      "name": "CVE-2025-38660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
    },
    {
      "name": "CVE-2025-38692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
    },
    {
      "name": "CVE-2025-38703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
    },
    {
      "name": "CVE-2025-38705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
    },
    {
      "name": "CVE-2025-38710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
    },
    {
      "name": "CVE-2025-38722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
    },
    {
      "name": "CVE-2020-19726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
    },
    {
      "name": "CVE-2021-46174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
    },
    {
      "name": "CVE-2022-35205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
    },
    {
      "name": "CVE-2022-4285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
    },
    {
      "name": "CVE-2022-44840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
    },
    {
      "name": "CVE-2022-45703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
    },
    {
      "name": "CVE-2022-47007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
    },
    {
      "name": "CVE-2022-47008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
    },
    {
      "name": "CVE-2022-47010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
    },
    {
      "name": "CVE-2022-47011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
    },
    {
      "name": "CVE-2024-28835",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
    },
    {
      "name": "CVE-2022-47695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
    },
    {
      "name": "CVE-2022-48063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
    },
    {
      "name": "CVE-2022-48065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
    },
    {
      "name": "CVE-2023-52356",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
    },
    {
      "name": "CVE-2023-6228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
    },
    {
      "name": "CVE-2023-6277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
    },
    {
      "name": "CVE-2025-39726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
    },
    {
      "name": "CVE-2025-39732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
    },
    {
      "name": "CVE-2025-39739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
    },
    {
      "name": "CVE-2025-39744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
    },
    {
      "name": "CVE-2025-39746",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
    },
    {
      "name": "CVE-2025-39747",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
    },
    {
      "name": "CVE-2025-39750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
    },
    {
      "name": "CVE-2025-39758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
    },
    {
      "name": "CVE-2025-39763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
    },
    {
      "name": "CVE-2025-39797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
    },
    {
      "name": "CVE-2025-39889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
    },
    {
      "name": "CVE-2025-11412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
    },
    {
      "name": "CVE-2025-11414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
    },
    {
      "name": "CVE-2025-11495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
    },
    {
      "name": "CVE-2024-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
    },
    {
      "name": "CVE-2025-39934",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
    },
    {
      "name": "CVE-2025-39937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
    },
    {
      "name": "CVE-2025-39945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
    },
    {
      "name": "CVE-2025-39946",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
    },
    {
      "name": "CVE-2025-39949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
    },
    {
      "name": "CVE-2025-39953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
    },
    {
      "name": "CVE-2025-39955",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
    },
    {
      "name": "CVE-2025-39967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
    },
    {
      "name": "CVE-2025-39968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
    },
    {
      "name": "CVE-2025-39969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
    },
    {
      "name": "CVE-2025-39970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
    },
    {
      "name": "CVE-2025-39971",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
    },
    {
      "name": "CVE-2025-39972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
    },
    {
      "name": "CVE-2025-39973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
    },
    {
      "name": "CVE-2025-39980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
    },
    {
      "name": "CVE-2025-39985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
    },
    {
      "name": "CVE-2025-39987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
    },
    {
      "name": "CVE-2025-39994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
    },
    {
      "name": "CVE-2025-39998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
    },
    {
      "name": "CVE-2025-40001",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
    },
    {
      "name": "CVE-2025-38232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
    },
    {
      "name": "CVE-2025-38253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
    },
    {
      "name": "CVE-2025-38258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
    },
    {
      "name": "CVE-2025-38321",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
    },
    {
      "name": "CVE-2025-38333",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
    },
    {
      "name": "CVE-2025-38368",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
    },
    {
      "name": "CVE-2025-38374",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
    },
    {
      "name": "CVE-2025-38388",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
    },
    {
      "name": "CVE-2025-38390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
    },
    {
      "name": "CVE-2025-38405",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
    },
    {
      "name": "CVE-2025-38407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
    },
    {
      "name": "CVE-2024-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
    },
    {
      "name": "CVE-2024-6345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
    },
    {
      "name": "CVE-2025-58056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
    },
    {
      "name": "CVE-2025-58057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
    },
    {
      "name": "CVE-2025-47910",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
    },
    {
      "name": "CVE-2025-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
    },
    {
      "name": "CVE-2025-9900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
    },
    {
      "name": "CVE-2025-11839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
    },
    {
      "name": "CVE-2025-11840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
    },
    {
      "name": "CVE-2025-40019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
    },
    {
      "name": "CVE-2025-40020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
    },
    {
      "name": "CVE-2025-40021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
    },
    {
      "name": "CVE-2025-40026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
    },
    {
      "name": "CVE-2025-40027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
    },
    {
      "name": "CVE-2025-40029",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
    },
    {
      "name": "CVE-2025-40030",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
    },
    {
      "name": "CVE-2025-40035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
    },
    {
      "name": "CVE-2025-40042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
    },
    {
      "name": "CVE-2025-40043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
    },
    {
      "name": "CVE-2025-40044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
    },
    {
      "name": "CVE-2025-40048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
    },
    {
      "name": "CVE-2025-40049",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
    },
    {
      "name": "CVE-2025-40053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
    },
    {
      "name": "CVE-2025-40055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
    },
    {
      "name": "CVE-2025-40060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
    },
    {
      "name": "CVE-2025-40068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
    },
    {
      "name": "CVE-2025-40078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
    },
    {
      "name": "CVE-2025-40081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
    },
    {
      "name": "CVE-2025-6075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
    },
    {
      "name": "CVE-2025-53057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
    },
    {
      "name": "CVE-2025-53066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
    },
    {
      "name": "CVE-2025-10966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
    },
    {
      "name": "CVE-2024-8244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
    },
    {
      "name": "CVE-2025-58767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
    },
    {
      "name": "CVE-2025-47906",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
    },
    {
      "name": "CVE-2025-8869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
    },
    {
      "name": "CVE-2023-3164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
    },
    {
      "name": "CVE-2024-1013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
    },
    {
      "name": "CVE-2024-34397",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
    },
    {
      "name": "CVE-2024-6232",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
    },
    {
      "name": "CVE-2025-40085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
    },
    {
      "name": "CVE-2025-40087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
    },
    {
      "name": "CVE-2025-40088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
    },
    {
      "name": "CVE-2025-40092",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
    },
    {
      "name": "CVE-2025-40094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
    },
    {
      "name": "CVE-2025-40105",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
    },
    {
      "name": "CVE-2025-40106",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
    },
    {
      "name": "CVE-2025-47912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
    },
    {
      "name": "CVE-2025-58183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
    },
    {
      "name": "CVE-2025-58185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
    },
    {
      "name": "CVE-2025-58186",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
    },
    {
      "name": "CVE-2025-58187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
    },
    {
      "name": "CVE-2025-58188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
    },
    {
      "name": "CVE-2025-58189",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
    },
    {
      "name": "CVE-2025-61723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
    },
    {
      "name": "CVE-2025-61724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
    },
    {
      "name": "CVE-2025-61725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
    },
    {
      "name": "CVE-2025-12817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
    },
    {
      "name": "CVE-2025-12818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
    },
    {
      "name": "CVE-2024-6119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
    },
    {
      "name": "CVE-2001-1268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
    },
    {
      "name": "CVE-2001-1269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
    },
    {
      "name": "CVE-2005-0602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
    },
    {
      "name": "CVE-2014-9636",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
    },
    {
      "name": "CVE-2014-9913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
    },
    {
      "name": "CVE-2015-7696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
    },
    {
      "name": "CVE-2015-7697",
      "url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
    },
    {
      "name": "CVE-2016-9844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
    },
    {
      "name": "CVE-2018-1000035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
    },
    {
      "name": "CVE-2018-13410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
    },
    {
      "name": "CVE-2021-4214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
    },
    {
      "name": "CVE-2021-4217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
    },
    {
      "name": "CVE-2022-0529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
    },
    {
      "name": "CVE-2022-1210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
    },
    {
      "name": "CVE-2022-2519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
    },
    {
      "name": "CVE-2022-2520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
    },
    {
      "name": "CVE-2022-2521",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
    },
    {
      "name": "CVE-2022-26280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
    },
    {
      "name": "CVE-2022-28805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
    },
    {
      "name": "CVE-2022-2953",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
    },
    {
      "name": "CVE-2022-48281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
    },
    {
      "name": "CVE-2023-30571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
    },
    {
      "name": "CVE-2023-3618",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
    },
    {
      "name": "CVE-2024-13978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
    },
    {
      "name": "CVE-2024-37407",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
    },
    {
      "name": "CVE-2024-57970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
    },
    {
      "name": "CVE-2025-10911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
    },
    {
      "name": "CVE-2025-11731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
    },
    {
      "name": "CVE-2025-1632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
    },
    {
      "name": "CVE-2025-4056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
    },
    {
      "name": "CVE-2025-5918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
    },
    {
      "name": "CVE-2025-59375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
    },
    {
      "name": "CVE-2025-6052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
    },
    {
      "name": "CVE-2025-6141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
    },
    {
      "name": "CVE-2025-7039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
    },
    {
      "name": "CVE-2025-8177",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
    },
    {
      "name": "CVE-2025-8534",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
    },
    {
      "name": "CVE-2025-8851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
    },
    {
      "name": "CVE-2025-9165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
    },
    {
      "name": "CVE-2025-9714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
    },
    {
      "name": "CVE-2024-45491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
    },
    {
      "name": "CVE-2024-45492",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
    },
    {
      "name": "CVE-2024-38816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
    },
    {
      "name": "CVE-2024-7264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
    },
    {
      "name": "CVE-2024-34459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
    },
    {
      "name": "CVE-2024-8096",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
    },
    {
      "name": "CVE-2025-39943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
    },
    {
      "name": "CVE-2025-39951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
    },
    {
      "name": "CVE-2025-40006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
    },
    {
      "name": "CVE-2025-40070",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
    },
    {
      "name": "CVE-2023-25433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
    },
    {
      "name": "CVE-2024-37371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
    },
    {
      "name": "CVE-2025-39986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
    },
    {
      "name": "CVE-2025-39988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
    },
    {
      "name": "CVE-2025-39995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
    },
    {
      "name": "CVE-2025-39996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
    },
    {
      "name": "CVE-2025-40011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
    },
    {
      "name": "CVE-2025-40109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
    },
    {
      "name": "CVE-2024-9143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
    },
    {
      "name": "CVE-2024-38819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
    },
    {
      "name": "CVE-2022-48468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
    },
    {
      "name": "CVE-2025-59419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
    },
    {
      "name": "CVE-2025-52881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
    },
    {
      "name": "CVE-2025-58058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
    },
    {
      "name": "CVE-2025-38507",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
    },
    {
      "name": "CVE-2025-38532",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
    },
    {
      "name": "CVE-2025-38549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
    },
    {
      "name": "CVE-2025-38551",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
    },
    {
      "name": "CVE-2025-38615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
    },
    {
      "name": "CVE-2025-38619",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
    },
    {
      "name": "CVE-2025-38625",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
    },
    {
      "name": "CVE-2025-38626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
    },
    {
      "name": "CVE-2025-38648",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
    },
    {
      "name": "CVE-2025-38675",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
    },
    {
      "name": "CVE-2025-40111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
    },
    {
      "name": "CVE-2025-40112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
    },
    {
      "name": "CVE-2025-40115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
    },
    {
      "name": "CVE-2025-40116",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
    },
    {
      "name": "CVE-2025-40118",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
    },
    {
      "name": "CVE-2025-40120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
    },
    {
      "name": "CVE-2025-40121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
    },
    {
      "name": "CVE-2025-40124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
    },
    {
      "name": "CVE-2025-40125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
    },
    {
      "name": "CVE-2025-40126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
    },
    {
      "name": "CVE-2025-40127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
    },
    {
      "name": "CVE-2025-40134",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
    },
    {
      "name": "CVE-2025-40140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
    },
    {
      "name": "CVE-2025-40153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
    },
    {
      "name": "CVE-2025-40154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
    },
    {
      "name": "CVE-2025-40167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
    },
    {
      "name": "CVE-2025-40171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
    },
    {
      "name": "CVE-2025-40173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
    },
    {
      "name": "CVE-2025-40178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
    },
    {
      "name": "CVE-2025-40179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
    },
    {
      "name": "CVE-2025-40183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
    },
    {
      "name": "CVE-2025-40187",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
    },
    {
      "name": "CVE-2025-40188",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
    },
    {
      "name": "CVE-2025-40194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
    },
    {
      "name": "CVE-2025-40200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
    },
    {
      "name": "CVE-2025-40204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
    },
    {
      "name": "CVE-2025-40205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
    },
    {
      "name": "CVE-2024-45490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
    },
    {
      "name": "CVE-2024-8088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
    },
    {
      "name": "CVE-2024-9681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
    },
    {
      "name": "CVE-2025-13601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
    },
    {
      "name": "CVE-2025-64505",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
    },
    {
      "name": "CVE-2025-64506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
    },
    {
      "name": "CVE-2025-64720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
    },
    {
      "name": "CVE-2025-65018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
    },
    {
      "name": "CVE-2025-66382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
    },
    {
      "name": "CVE-2025-40215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
    },
    {
      "name": "CVE-2025-40219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
    },
    {
      "name": "CVE-2025-40220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
    },
    {
      "name": "CVE-2025-40223",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
    },
    {
      "name": "CVE-2025-40233",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
    },
    {
      "name": "CVE-2025-40240",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
    },
    {
      "name": "CVE-2025-40243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
    },
    {
      "name": "CVE-2025-40244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
    },
    {
      "name": "CVE-2025-40245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
    },
    {
      "name": "CVE-2025-61727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
    },
    {
      "name": "CVE-2025-61729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
    },
    {
      "name": "CVE-2025-66293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
    },
    {
      "name": "CVE-2025-13836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
    },
    {
      "name": "CVE-2025-13837",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
    },
    {
      "name": "CVE-2025-12084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
    },
    {
      "name": "CVE-2024-11168",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
    },
    {
      "name": "CVE-2024-38828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
    },
    {
      "name": "CVE-2025-40297",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
    },
    {
      "name": "CVE-2025-38686",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
    },
    {
      "name": "CVE-2025-39748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
    },
    {
      "name": "CVE-2024-11053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
    },
    {
      "name": "CVE-2024-10041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
    },
    {
      "name": "CVE-2024-7006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
    },
    {
      "name": "CVE-2024-53114",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
    },
    {
      "name": "CVE-2017-9937",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
    },
    {
      "name": "CVE-2022-2056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
    },
    {
      "name": "CVE-2022-2057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
    },
    {
      "name": "CVE-2022-2058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
    },
    {
      "name": "CVE-2022-34526",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
    },
    {
      "name": "CVE-2022-3479",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
    },
    {
      "name": "CVE-2022-3570",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
    },
    {
      "name": "CVE-2022-3597",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
    },
    {
      "name": "CVE-2022-3598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
    },
    {
      "name": "CVE-2022-3599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
    },
    {
      "name": "CVE-2022-3626",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
    },
    {
      "name": "CVE-2022-3627",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
    },
    {
      "name": "CVE-2022-40090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
    },
    {
      "name": "CVE-2022-4645",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
    },
    {
      "name": "CVE-2023-0795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
    },
    {
      "name": "CVE-2023-0796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
    },
    {
      "name": "CVE-2023-0797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
    },
    {
      "name": "CVE-2023-0798",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
    },
    {
      "name": "CVE-2023-0799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
    },
    {
      "name": "CVE-2023-0800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
    },
    {
      "name": "CVE-2023-0801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
    },
    {
      "name": "CVE-2023-0802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
    },
    {
      "name": "CVE-2023-0803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
    },
    {
      "name": "CVE-2023-0804",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
    },
    {
      "name": "CVE-2023-1916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
    },
    {
      "name": "CVE-2023-25434",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
    },
    {
      "name": "CVE-2023-25435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
    },
    {
      "name": "CVE-2023-2731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
    },
    {
      "name": "CVE-2023-2908",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
    },
    {
      "name": "CVE-2023-30775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
    },
    {
      "name": "CVE-2023-3576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
    },
    {
      "name": "CVE-2023-40745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
    },
    {
      "name": "CVE-2023-41175",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
    },
    {
      "name": "CVE-2024-56538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
    },
    {
      "name": "CVE-2025-0938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
    },
    {
      "name": "CVE-2025-0167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
    },
    {
      "name": "CVE-2025-0665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
    },
    {
      "name": "CVE-2025-0725",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
    },
    {
      "name": "CVE-2024-47535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
    },
    {
      "name": "CVE-2024-50602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
    },
    {
      "name": "CVE-2024-12797",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
    },
    {
      "name": "CVE-2024-13176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
    },
    {
      "name": "CVE-2025-1094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
    },
    {
      "name": "CVE-2020-16599",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
    },
    {
      "name": "CVE-2023-1579",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
    },
    {
      "name": "CVE-2025-1795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
    },
    {
      "name": "CVE-2024-6763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
    },
    {
      "name": "CVE-2022-49043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
    },
    {
      "name": "CVE-2024-51744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
    },
    {
      "name": "CVE-2025-24970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
    },
    {
      "name": "CVE-2025-25193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
    },
    {
      "name": "CVE-2024-45337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
    },
    {
      "name": "CVE-2025-22870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
    },
    {
      "name": "CVE-2022-49063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
    },
    {
      "name": "CVE-2024-56171",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
    },
    {
      "name": "CVE-2025-27113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
    },
    {
      "name": "CVE-2024-58011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
    },
    {
      "name": "CVE-2025-21861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
    },
    {
      "name": "CVE-2025-21883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
    },
    {
      "name": "CVE-2024-8176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
    },
    {
      "name": "CVE-2025-24928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
    },
    {
      "name": "CVE-2025-21919",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
    },
    {
      "name": "CVE-2023-1972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
    },
    {
      "name": "CVE-2023-25584",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
    },
    {
      "name": "CVE-2023-25585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
    },
    {
      "name": "CVE-2025-22868",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
    },
    {
      "name": "CVE-2025-22871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
    },
    {
      "name": "CVE-2025-30204",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
    },
    {
      "name": "CVE-2025-22058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
    },
    {
      "name": "CVE-2025-22126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
    },
    {
      "name": "CVE-2025-4516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
    },
    {
      "name": "CVE-2024-55549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
    },
    {
      "name": "CVE-2024-9287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
    },
    {
      "name": "CVE-2025-24855",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
    },
    {
      "name": "CVE-2025-32414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
    },
    {
      "name": "CVE-2025-32415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
    },
    {
      "name": "CVE-2025-21884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
    },
    {
      "name": "CVE-2025-21931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
    },
    {
      "name": "CVE-2025-22013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
    },
    {
      "name": "CVE-2025-22102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
    },
    {
      "name": "CVE-2025-22104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
    },
    {
      "name": "CVE-2025-22115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
    },
    {
      "name": "CVE-2025-22128",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
    },
    {
      "name": "CVE-2025-23145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
    },
    {
      "name": "CVE-2025-37799",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
    },
    {
      "name": "CVE-2025-37749",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
    },
    {
      "name": "CVE-2025-22869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
    },
    {
      "name": "CVE-2025-4947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
    },
    {
      "name": "CVE-2025-5025",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
    },
    {
      "name": "CVE-2025-23140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
    },
    {
      "name": "CVE-2025-23141",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
    },
    {
      "name": "CVE-2025-23142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
    },
    {
      "name": "CVE-2025-23144",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
    },
    {
      "name": "CVE-2025-23146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
    },
    {
      "name": "CVE-2025-23147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
    },
    {
      "name": "CVE-2025-23148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
    },
    {
      "name": "CVE-2025-23150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
    },
    {
      "name": "CVE-2025-23151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
    },
    {
      "name": "CVE-2025-23156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
    },
    {
      "name": "CVE-2025-23157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
    },
    {
      "name": "CVE-2025-23158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
    },
    {
      "name": "CVE-2025-23159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
    },
    {
      "name": "CVE-2025-23161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
    },
    {
      "name": "CVE-2025-23163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
    },
    {
      "name": "CVE-2025-37738",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
    },
    {
      "name": "CVE-2025-37739",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
    },
    {
      "name": "CVE-2025-37740",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
    },
    {
      "name": "CVE-2025-37741",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
    },
    {
      "name": "CVE-2025-37742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
    },
    {
      "name": "CVE-2025-37748",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
    },
    {
      "name": "CVE-2025-37757",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
    },
    {
      "name": "CVE-2025-37758",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
    },
    {
      "name": "CVE-2025-37765",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
    },
    {
      "name": "CVE-2025-37766",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
    },
    {
      "name": "CVE-2025-37767",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
    },
    {
      "name": "CVE-2025-37768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
    },
    {
      "name": "CVE-2025-37769",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
    },
    {
      "name": "CVE-2025-37770",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
    },
    {
      "name": "CVE-2025-37771",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
    },
    {
      "name": "CVE-2025-37772",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
    },
    {
      "name": "CVE-2025-37773",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
    },
    {
      "name": "CVE-2025-37775",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
    },
    {
      "name": "CVE-2025-37778",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
    },
    {
      "name": "CVE-2025-37780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
    },
    {
      "name": "CVE-2025-37781",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
    },
    {
      "name": "CVE-2025-37787",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
    },
    {
      "name": "CVE-2025-37788",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
    },
    {
      "name": "CVE-2025-37789",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
    },
    {
      "name": "CVE-2025-37790",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
    },
    {
      "name": "CVE-2025-37792",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
    },
    {
      "name": "CVE-2025-37794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
    },
    {
      "name": "CVE-2025-37796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
    },
    {
      "name": "CVE-2025-37801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
    },
    {
      "name": "CVE-2025-37803",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
    },
    {
      "name": "CVE-2025-37805",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
    },
    {
      "name": "CVE-2025-37808",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
    },
    {
      "name": "CVE-2025-37810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
    },
    {
      "name": "CVE-2025-37811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
    },
    {
      "name": "CVE-2025-37812",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
    },
    {
      "name": "CVE-2025-37815",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
    },
    {
      "name": "CVE-2025-37817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
    },
    {
      "name": "CVE-2025-37820",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
    },
    {
      "name": "CVE-2025-37823",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
    },
    {
      "name": "CVE-2025-37824",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
    },
    {
      "name": "CVE-2025-37829",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
    },
    {
      "name": "CVE-2025-37830",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
    },
    {
      "name": "CVE-2025-37836",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
    },
    {
      "name": "CVE-2025-37839",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
    },
    {
      "name": "CVE-2025-37840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
    },
    {
      "name": "CVE-2025-37841",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
    },
    {
      "name": "CVE-2025-37844",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
    },
    {
      "name": "CVE-2025-37849",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
    },
    {
      "name": "CVE-2025-37850",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
    },
    {
      "name": "CVE-2025-37851",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
    },
    {
      "name": "CVE-2025-37852",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
    },
    {
      "name": "CVE-2025-37854",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
    },
    {
      "name": "CVE-2025-37857",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
    },
    {
      "name": "CVE-2025-37858",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
    },
    {
      "name": "CVE-2025-37859",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
    },
    {
      "name": "CVE-2025-37862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
    },
    {
      "name": "CVE-2025-37865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
    },
    {
      "name": "CVE-2025-37867",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
    },
    {
      "name": "CVE-2025-37871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
    },
    {
      "name": "CVE-2025-37875",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
    },
    {
      "name": "CVE-2025-37879",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
    },
    {
      "name": "CVE-2025-37881",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
    },
    {
      "name": "CVE-2025-37883",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
    },
    {
      "name": "CVE-2025-37884",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
    },
    {
      "name": "CVE-2025-37885",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
    },
    {
      "name": "CVE-2025-37892",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
    },
    {
      "name": "CVE-2025-37938",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
    },
    {
      "name": "CVE-2025-37940",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
    },
    {
      "name": "CVE-2025-37979",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
    },
    {
      "name": "CVE-2025-37982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
    },
    {
      "name": "CVE-2025-37983",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
    },
    {
      "name": "CVE-2025-37985",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
    },
    {
      "name": "CVE-2025-37989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
    },
    {
      "name": "CVE-2025-37819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
    },
    {
      "name": "CVE-2025-37897",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
    },
    {
      "name": "CVE-2025-37901",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
    },
    {
      "name": "CVE-2025-37903",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
    },
    {
      "name": "CVE-2025-37905",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
    },
    {
      "name": "CVE-2025-37909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
    },
    {
      "name": "CVE-2025-37911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
    },
    {
      "name": "CVE-2025-37912",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
    },
    {
      "name": "CVE-2025-37913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
    },
    {
      "name": "CVE-2025-37914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
    },
    {
      "name": "CVE-2025-37915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
    },
    {
      "name": "CVE-2025-37917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
    },
    {
      "name": "CVE-2025-37921",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
    },
    {
      "name": "CVE-2025-37923",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
    },
    {
      "name": "CVE-2025-37924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
    },
    {
      "name": "CVE-2025-37927",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
    },
    {
      "name": "CVE-2025-37928",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
    },
    {
      "name": "CVE-2025-37930",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
    },
    {
      "name": "CVE-2025-37936",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
    },
    {
      "name": "CVE-2025-37947",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
    },
    {
      "name": "CVE-2025-37948",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
    },
    {
      "name": "CVE-2025-37949",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
    },
    {
      "name": "CVE-2025-37951",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
    },
    {
      "name": "CVE-2025-37959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
    },
    {
      "name": "CVE-2025-37961",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
    },
    {
      "name": "CVE-2025-37962",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
    },
    {
      "name": "CVE-2025-37963",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
    },
    {
      "name": "CVE-2025-37967",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
    },
    {
      "name": "CVE-2025-37969",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
    },
    {
      "name": "CVE-2025-37970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
    },
    {
      "name": "CVE-2025-37972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
    },
    {
      "name": "CVE-2025-37990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
    },
    {
      "name": "CVE-2025-37991",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
    },
    {
      "name": "CVE-2023-53107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
    },
    {
      "name": "CVE-2025-4517",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
    },
    {
      "name": "CVE-2025-4330",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
    },
    {
      "name": "CVE-2025-4138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
    },
    {
      "name": "CVE-2024-12718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
    },
    {
      "name": "CVE-2025-4435",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
    },
    {
      "name": "CVE-2023-24056",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
    },
    {
      "name": "CVE-2023-52355",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
    },
    {
      "name": "CVE-2023-6779",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
    },
    {
      "name": "CVE-2023-6780",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
    },
    {
      "name": "CVE-2024-12133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
    },
    {
      "name": "CVE-2024-12243",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
    },
    {
      "name": "CVE-2024-2236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
    },
    {
      "name": "CVE-2024-52533",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
    },
    {
      "name": "CVE-2024-56433",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
    },
    {
      "name": "CVE-2025-0395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
    },
    {
      "name": "CVE-2025-1390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
    },
    {
      "name": "CVE-2025-3360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
    },
    {
      "name": "CVE-2025-4373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
    },
    {
      "name": "CVE-2025-4598",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
    },
    {
      "name": "CVE-2025-23160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
    },
    {
      "name": "CVE-2025-37755",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
    },
    {
      "name": "CVE-2025-37809",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
    },
    {
      "name": "CVE-2025-37831",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
    },
    {
      "name": "CVE-2025-37842",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
    },
    {
      "name": "CVE-2025-37886",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
    },
    {
      "name": "CVE-2025-37887",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
    },
    {
      "name": "CVE-2025-37957",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
    },
    {
      "name": "CVE-2025-37960",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
    },
    {
      "name": "CVE-2025-37943",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
    },
    {
      "name": "CVE-2012-0880",
      "url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
    },
    {
      "name": "CVE-2024-56406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
    },
    {
      "name": "CVE-2025-22872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
    },
    {
      "name": "CVE-2025-4802",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
    },
    {
      "name": "CVE-2025-23149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
    },
    {
      "name": "CVE-2025-23155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
    },
    {
      "name": "CVE-2025-37754",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
    },
    {
      "name": "CVE-2025-37793",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
    },
    {
      "name": "CVE-2025-37800",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
    },
    {
      "name": "CVE-2025-37846",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
    },
    {
      "name": "CVE-2025-37853",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
    },
    {
      "name": "CVE-2025-37873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
    },
    {
      "name": "CVE-2025-37874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
    },
    {
      "name": "CVE-2025-37891",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
    },
    {
      "name": "CVE-2025-37900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
    },
    {
      "name": "CVE-2025-37918",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
    },
    {
      "name": "CVE-2025-37925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
    },
    {
      "name": "CVE-2025-37931",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
    },
    {
      "name": "CVE-2025-37933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
    },
    {
      "name": "CVE-2025-37944",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
    },
    {
      "name": "CVE-2025-37954",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
    },
    {
      "name": "CVE-2025-37968",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
    },
    {
      "name": "CVE-2025-37978",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
    },
    {
      "name": "CVE-2025-37980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
    },
    {
      "name": "CVE-2025-37986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
    },
    {
      "name": "CVE-2025-37987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
    },
    {
      "name": "CVE-2025-37998",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
    },
    {
      "name": "CVE-2025-38104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
    },
    {
      "name": "CVE-2023-42366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
    },
    {
      "name": "CVE-2025-6020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
    },
    {
      "name": "CVE-2025-6021",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
    },
    {
      "name": "CVE-2025-22026",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
    },
    {
      "name": "CVE-2025-22101",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
    },
    {
      "name": "CVE-2025-22120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
    },
    {
      "name": "CVE-2025-23143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
    },
    {
      "name": "CVE-2025-37744",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
    },
    {
      "name": "CVE-2025-37745",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
    },
    {
      "name": "CVE-2025-37759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
    },
    {
      "name": "CVE-2025-37761",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
    },
    {
      "name": "CVE-2025-37763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
    },
    {
      "name": "CVE-2025-37764",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
    },
    {
      "name": "CVE-2025-37777",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
    },
    {
      "name": "CVE-2025-37784",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
    },
    {
      "name": "CVE-2025-37786",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
    },
    {
      "name": "CVE-2025-37813",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
    },
    {
      "name": "CVE-2025-37816",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
    },
    {
      "name": "CVE-2025-37822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
    },
    {
      "name": "CVE-2025-37826",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
    },
    {
      "name": "CVE-2025-37827",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
    },
    {
      "name": "CVE-2025-37828",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
    },
    {
      "name": "CVE-2025-37856",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
    },
    {
      "name": "CVE-2025-37861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
    },
    {
      "name": "CVE-2025-37863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
    },
    {
      "name": "CVE-2025-37864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
    },
    {
      "name": "CVE-2025-37869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
    },
    {
      "name": "CVE-2025-37872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
    },
    {
      "name": "CVE-2025-37878",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
    },
    {
      "name": "CVE-2025-37945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
    },
    {
      "name": "CVE-2025-37975",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
    },
    {
      "name": "CVE-2025-37977",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
    },
    {
      "name": "CVE-2025-37984",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
    },
    {
      "name": "CVE-2025-37988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
    },
    {
      "name": "CVE-2025-39989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
    },
    {
      "name": "CVE-2025-25724",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
    },
    {
      "name": "CVE-2025-37973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
    },
    {
      "name": "CVE-2025-37992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
    },
    {
      "name": "CVE-2025-37994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
    },
    {
      "name": "CVE-2025-37995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
    },
    {
      "name": "CVE-2025-38003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
    },
    {
      "name": "CVE-2025-38004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
    },
    {
      "name": "CVE-2025-38005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
    },
    {
      "name": "CVE-2025-38007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
    },
    {
      "name": "CVE-2025-38009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
    },
    {
      "name": "CVE-2025-38010",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
    },
    {
      "name": "CVE-2025-38011",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
    },
    {
      "name": "CVE-2025-38013",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
    },
    {
      "name": "CVE-2025-38014",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
    },
    {
      "name": "CVE-2025-38015",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
    },
    {
      "name": "CVE-2025-38018",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
    },
    {
      "name": "CVE-2025-38020",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
    },
    {
      "name": "CVE-2025-38023",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
    },
    {
      "name": "CVE-2025-38024",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
    },
    {
      "name": "CVE-2025-38027",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
    },
    {
      "name": "CVE-2025-38031",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
    },
    {
      "name": "CVE-2025-38040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
    },
    {
      "name": "CVE-2025-38043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
    },
    {
      "name": "CVE-2025-38044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
    },
    {
      "name": "CVE-2025-38045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
    },
    {
      "name": "CVE-2025-38053",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
    },
    {
      "name": "CVE-2025-38055",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
    },
    {
      "name": "CVE-2025-38057",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
    },
    {
      "name": "CVE-2025-38059",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
    },
    {
      "name": "CVE-2025-38060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
    },
    {
      "name": "CVE-2025-38065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
    },
    {
      "name": "CVE-2025-38068",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
    },
    {
      "name": "CVE-2025-38072",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
    },
    {
      "name": "CVE-2025-38077",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
    },
    {
      "name": "CVE-2025-38078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
    },
    {
      "name": "CVE-2025-38079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
    },
    {
      "name": "CVE-2025-38080",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
    },
    {
      "name": "CVE-2025-38081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
    },
    {
      "name": "CVE-2025-48734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
    },
    {
      "name": "CVE-2025-38110",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
    },
    {
      "name": "CVE-2025-38061",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
    },
    {
      "name": "CVE-2024-23337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
    },
    {
      "name": "CVE-2024-47611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
    },
    {
      "name": "CVE-2025-0913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
    },
    {
      "name": "CVE-2025-22874",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
    },
    {
      "name": "CVE-2025-32988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
    },
    {
      "name": "CVE-2025-32989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
    },
    {
      "name": "CVE-2025-32990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
    },
    {
      "name": "CVE-2025-4673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
    },
    {
      "name": "CVE-2025-48060",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
    },
    {
      "name": "CVE-2025-48924",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
    },
    {
      "name": "CVE-2025-50181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
    },
    {
      "name": "CVE-2025-5914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
    },
    {
      "name": "CVE-2025-5915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
    },
    {
      "name": "CVE-2025-5916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
    },
    {
      "name": "CVE-2025-5917",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
    },
    {
      "name": "CVE-2025-6069",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
    },
    {
      "name": "CVE-2025-6395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
    },
    {
      "name": "CVE-2025-37916",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
    },
    {
      "name": "CVE-2025-37920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
    },
    {
      "name": "CVE-2025-37922",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
    },
    {
      "name": "CVE-2025-37935",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
    },
    {
      "name": "CVE-2025-38094",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
    },
    {
      "name": "CVE-2025-38086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
    },
    {
      "name": "CVE-2025-38089",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
    },
    {
      "name": "CVE-2025-8194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
    },
    {
      "name": "CVE-2025-7424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
    },
    {
      "name": "CVE-2025-7425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
    },
    {
      "name": "CVE-2025-50182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
    },
    {
      "name": "CVE-2025-5889",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
    },
    {
      "name": "CVE-2025-38052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
    },
    {
      "name": "CVE-2025-38087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
    },
    {
      "name": "CVE-2025-38088",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
    },
    {
      "name": "CVE-2025-38181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
    },
    {
      "name": "CVE-2025-38200",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
    },
    {
      "name": "CVE-2025-38212",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
    },
    {
      "name": "CVE-2025-38257",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
    },
    {
      "name": "CVE-2025-38289",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
    },
    {
      "name": "CVE-2025-38264",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
    },
    {
      "name": "CVE-2025-27817",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
    },
    {
      "name": "CVE-2025-27818",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
    },
    {
      "name": "CVE-2025-38250",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
    },
    {
      "name": "CVE-2025-38098",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
    },
    {
      "name": "CVE-2025-38099",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
    },
    {
      "name": "CVE-2025-38109",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
    },
    {
      "name": "CVE-2025-38117",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
    },
    {
      "name": "CVE-2025-38123",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
    },
    {
      "name": "CVE-2025-38127",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
    },
    {
      "name": "CVE-2021-20197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
    },
    {
      "name": "CVE-2021-32256",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
    },
    {
      "name": "CVE-2021-45078",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
    },
    {
      "name": "CVE-2024-57360",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
    },
    {
      "name": "CVE-2025-1150",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
    },
    {
      "name": "CVE-2025-1151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
    },
    {
      "name": "CVE-2025-1152",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
    },
    {
      "name": "CVE-2025-1153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
    },
    {
      "name": "CVE-2025-1371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
    },
    {
      "name": "CVE-2025-1376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
    },
    {
      "name": "CVE-2025-1377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
    },
    {
      "name": "CVE-2025-3198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
    },
    {
      "name": "CVE-2025-47273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
    },
    {
      "name": "CVE-2025-49794",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
    },
    {
      "name": "CVE-2025-49796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
    },
    {
      "name": "CVE-2025-5245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
    },
    {
      "name": "CVE-2025-7545",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
    },
    {
      "name": "CVE-2025-7546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
    },
    {
      "name": "CVE-2025-38095",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
    },
    {
      "name": "CVE-2025-38034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
    },
    {
      "name": "CVE-2025-38035",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
    },
    {
      "name": "CVE-2025-38037",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
    },
    {
      "name": "CVE-2025-38048",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
    },
    {
      "name": "CVE-2025-38051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
    },
    {
      "name": "CVE-2025-38058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
    },
    {
      "name": "CVE-2025-38062",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
    },
    {
      "name": "CVE-2025-38063",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
    },
    {
      "name": "CVE-2025-38066",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
    },
    {
      "name": "CVE-2025-38067",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
    },
    {
      "name": "CVE-2025-38071",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
    },
    {
      "name": "CVE-2025-38074",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
    },
    {
      "name": "CVE-2025-38075",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
    },
    {
      "name": "CVE-2025-38084",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
    },
    {
      "name": "CVE-2025-38085",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
    },
    {
      "name": "CVE-2025-38090",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
    },
    {
      "name": "CVE-2025-38097",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
    },
    {
      "name": "CVE-2025-38100",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
    },
    {
      "name": "CVE-2025-38102",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
    },
    {
      "name": "CVE-2025-38103",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
    },
    {
      "name": "CVE-2025-38107",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
    },
    {
      "name": "CVE-2025-38108",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
    },
    {
      "name": "CVE-2025-38111",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
    },
    {
      "name": "CVE-2025-38112",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
    },
    {
      "name": "CVE-2025-38113",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
    },
    {
      "name": "CVE-2025-38115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
    },
    {
      "name": "CVE-2025-38119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
    },
    {
      "name": "CVE-2025-38120",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
    },
    {
      "name": "CVE-2025-38122",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
    },
    {
      "name": "CVE-2025-38124",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
    },
    {
      "name": "CVE-2025-38126",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
    },
    {
      "name": "CVE-2025-38131",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
    },
    {
      "name": "CVE-2025-38135",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
    },
    {
      "name": "CVE-2025-38136",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
    },
    {
      "name": "CVE-2025-38138",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
    },
    {
      "name": "CVE-2025-38142",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
    },
    {
      "name": "CVE-2025-38143",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
    },
    {
      "name": "CVE-2025-38145",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
    },
    {
      "name": "CVE-2025-38146",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
    },
    {
      "name": "CVE-2025-38147",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
    },
    {
      "name": "CVE-2025-38148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
    },
    {
      "name": "CVE-2025-38153",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
    },
    {
      "name": "CVE-2025-38154",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
    },
    {
      "name": "CVE-2025-38157",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
    },
    {
      "name": "CVE-2025-38158",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
    },
    {
      "name": "CVE-2025-38159",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
    },
    {
      "name": "CVE-2025-38160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
    },
    {
      "name": "CVE-2025-38161",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
    },
    {
      "name": "CVE-2025-38163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
    },
    {
      "name": "CVE-2025-38165",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
    },
    {
      "name": "CVE-2025-38166",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
    },
    {
      "name": "CVE-2025-38167",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
    },
    {
      "name": "CVE-2025-38170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
    },
    {
      "name": "CVE-2025-38173",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
    },
    {
      "name": "CVE-2025-38174",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
    },
    {
      "name": "CVE-2025-38180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
    },
    {
      "name": "CVE-2025-38183",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
    },
    {
      "name": "CVE-2025-38184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
    },
    {
      "name": "CVE-2025-38185",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
    },
    {
      "name": "CVE-2025-38190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
    },
    {
      "name": "CVE-2025-38191",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
    },
    {
      "name": "CVE-2025-38193",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
    },
    {
      "name": "CVE-2025-38194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
    },
    {
      "name": "CVE-2025-38197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
    },
    {
      "name": "CVE-2025-38198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
    },
    {
      "name": "CVE-2025-38202",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
    },
    {
      "name": "CVE-2025-38211",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
    },
    {
      "name": "CVE-2025-38214",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
    },
    {
      "name": "CVE-2025-38215",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
    },
    {
      "name": "CVE-2025-38218",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
    },
    {
      "name": "CVE-2025-38219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
    },
    {
      "name": "CVE-2025-38222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
    },
    {
      "name": "CVE-2025-38225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
    },
    {
      "name": "CVE-2025-38226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
    },
    {
      "name": "CVE-2025-38229",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
    },
    {
      "name": "CVE-2025-38230",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
    },
    {
      "name": "CVE-2025-38231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
    },
    {
      "name": "CVE-2025-38236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
    },
    {
      "name": "CVE-2025-38239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
    },
    {
      "name": "CVE-2025-38245",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
    },
    {
      "name": "CVE-2025-38249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
    },
    {
      "name": "CVE-2025-38251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
    },
    {
      "name": "CVE-2025-38259",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
    },
    {
      "name": "CVE-2025-38260",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
    },
    {
      "name": "CVE-2025-38262",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
    },
    {
      "name": "CVE-2025-38263",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
    },
    {
      "name": "CVE-2025-38275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
    },
    {
      "name": "CVE-2025-38277",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
    },
    {
      "name": "CVE-2025-38280",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
    },
    {
      "name": "CVE-2025-38282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
    },
    {
      "name": "CVE-2025-38285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
    },
    {
      "name": "CVE-2025-38286",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
    },
    {
      "name": "CVE-2025-38293",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
    },
    {
      "name": "CVE-2025-38298",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
    },
    {
      "name": "CVE-2025-38300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
    },
    {
      "name": "CVE-2025-38304",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
    },
    {
      "name": "CVE-2025-38305",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
    },
    {
      "name": "CVE-2025-38310",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
    },
    {
      "name": "CVE-2025-38312",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
    },
    {
      "name": "CVE-2025-38313",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
    },
    {
      "name": "CVE-2025-38319",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
    },
    {
      "name": "CVE-2025-38320",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
    },
    {
      "name": "CVE-2025-38323",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
    },
    {
      "name": "CVE-2025-38324",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
    },
    {
      "name": "CVE-2025-38326",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
    },
    {
      "name": "CVE-2025-38328",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
    },
    {
      "name": "CVE-2025-38331",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
    },
    {
      "name": "CVE-2025-38332",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
    },
    {
      "name": "CVE-2025-38334",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
    },
    {
      "name": "CVE-2025-38335",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
    },
    {
      "name": "CVE-2025-38336",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
    },
    {
      "name": "CVE-2025-38337",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
    },
    {
      "name": "CVE-2025-38342",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
    },
    {
      "name": "CVE-2025-38344",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
    },
    {
      "name": "CVE-2025-38345",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
    },
    {
      "name": "CVE-2025-38346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
    },
    {
      "name": "CVE-2025-38348",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
    },
    {
      "name": "CVE-2025-38349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
    },
    {
      "name": "CVE-2025-38351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
    },
    {
      "name": "CVE-2025-38354",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
    },
    {
      "name": "CVE-2025-38362",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
    },
    {
      "name": "CVE-2025-38363",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
    },
    {
      "name": "CVE-2025-38364",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
    },
    {
      "name": "CVE-2025-38365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
    },
    {
      "name": "CVE-2025-38371",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
    },
    {
      "name": "CVE-2025-38375",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
    },
    {
      "name": "CVE-2025-38377",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
    },
    {
      "name": "CVE-2025-38382",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
    },
    {
      "name": "CVE-2025-38384",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
    },
    {
      "name": "CVE-2025-38385",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
    },
    {
      "name": "CVE-2025-38386",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
    },
    {
      "name": "CVE-2025-38387",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
    },
    {
      "name": "CVE-2025-38389",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
    },
    {
      "name": "CVE-2025-38391",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
    },
    {
      "name": "CVE-2025-38393",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
    },
    {
      "name": "CVE-2025-38395",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
    },
    {
      "name": "CVE-2025-38396",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
    },
    {
      "name": "CVE-2025-38399",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
    },
    {
      "name": "CVE-2025-38400",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
    },
    {
      "name": "CVE-2025-38401",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
    },
    {
      "name": "CVE-2025-38403",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
    },
    {
      "name": "CVE-2025-38406",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
    },
    {
      "name": "CVE-2025-38409",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
    },
    {
      "name": "CVE-2025-38410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
    },
    {
      "name": "CVE-2025-38412",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
    },
    {
      "name": "CVE-2025-38415",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
    },
    {
      "name": "CVE-2025-38416",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
    },
    {
      "name": "CVE-2025-38418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
    },
    {
      "name": "CVE-2025-38419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
    },
    {
      "name": "CVE-2025-38420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
    },
    {
      "name": "CVE-2025-38422",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
    },
    {
      "name": "CVE-2025-38424",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
    },
    {
      "name": "CVE-2025-38425",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
    },
    {
      "name": "CVE-2025-38428",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
    },
    {
      "name": "CVE-2025-38430",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
    },
    {
      "name": "CVE-2025-38437",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
    },
    {
      "name": "CVE-2025-38439",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
    },
    {
      "name": "CVE-2025-38441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
    },
    {
      "name": "CVE-2025-38443",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
    },
    {
      "name": "CVE-2025-38444",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
    },
    {
      "name": "CVE-2025-38445",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
    },
    {
      "name": "CVE-2025-38448",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
    },
    {
      "name": "CVE-2025-38449",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
    },
    {
      "name": "CVE-2025-38455",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
    },
    {
      "name": "CVE-2025-38456",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
    },
    {
      "name": "CVE-2025-38457",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
    },
    {
      "name": "CVE-2025-38458",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
    },
    {
      "name": "CVE-2025-38459",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
    },
    {
      "name": "CVE-2025-38460",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
    },
    {
      "name": "CVE-2025-38461",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
    },
    {
      "name": "CVE-2025-38462",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
    },
    {
      "name": "CVE-2025-38463",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
    },
    {
      "name": "CVE-2025-38464",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
    },
    {
      "name": "CVE-2025-38465",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
    },
    {
      "name": "CVE-2025-38466",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
    },
    {
      "name": "CVE-2025-38467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
    },
    {
      "name": "CVE-2025-38468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
    },
    {
      "name": "CVE-2025-38469",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
    },
    {
      "name": "CVE-2025-38470",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
    },
    {
      "name": "CVE-2025-38471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
    },
    {
      "name": "CVE-2025-38472",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
    },
    {
      "name": "CVE-2025-38473",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
    },
    {
      "name": "CVE-2025-38474",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
    },
    {
      "name": "CVE-2025-38476",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
    },
    {
      "name": "CVE-2025-38478",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
    },
    {
      "name": "CVE-2025-38480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
    },
    {
      "name": "CVE-2025-38481",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
    },
    {
      "name": "CVE-2025-38482",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
    },
    {
      "name": "CVE-2025-38483",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
    },
    {
      "name": "CVE-2025-38485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
    },
    {
      "name": "CVE-2025-38487",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
    },
    {
      "name": "CVE-2025-38488",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
    },
    {
      "name": "CVE-2025-38489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
    },
    {
      "name": "CVE-2025-38490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
    },
    {
      "name": "CVE-2025-38491",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
    },
    {
      "name": "CVE-2025-38493",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
    },
    {
      "name": "CVE-2025-38494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
    },
    {
      "name": "CVE-2025-38495",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
    },
    {
      "name": "CVE-2025-38496",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
    },
    {
      "name": "CVE-2025-38497",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
    },
    {
      "name": "CVE-2025-38499",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
    },
    {
      "name": "CVE-2025-38292",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
    },
    {
      "name": "CVE-2025-8713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
    },
    {
      "name": "CVE-2025-8714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
    },
    {
      "name": "CVE-2025-8715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
    },
    {
      "name": "CVE-2025-37952",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
    },
    {
      "name": "CVE-2025-37956",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
    },
    {
      "name": "CVE-2025-38006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
    },
    {
      "name": "CVE-2025-38008",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
    },
    {
      "name": "CVE-2025-38019",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
    },
    {
      "name": "CVE-2025-38129",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
    },
    {
      "name": "CVE-2025-38149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
    },
    {
      "name": "CVE-2025-38155",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
    },
    {
      "name": "CVE-2025-38162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
    },
    {
      "name": "CVE-2025-38182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
    },
    {
      "name": "CVE-2025-38192",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
    },
    {
      "name": "CVE-2025-38210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
    },
    {
      "name": "CVE-2025-38217",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
    },
    {
      "name": "CVE-2025-38220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
    },
    {
      "name": "CVE-2025-38244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
    },
    {
      "name": "CVE-2025-38246",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
    },
    {
      "name": "CVE-2025-38248",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
    },
    {
      "name": "CVE-2025-38265",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
    },
    {
      "name": "CVE-2025-38279",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
    },
    {
      "name": "CVE-2025-38283",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
    },
    {
      "name": "CVE-2025-38290",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
    },
    {
      "name": "CVE-2025-38299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
    },
    {
      "name": "CVE-2025-38303",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
    },
    {
      "name": "CVE-2025-38307",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
    },
    {
      "name": "CVE-2025-38338",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
    },
    {
      "name": "CVE-2025-38343",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
    },
    {
      "name": "CVE-2025-38361",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
    },
    {
      "name": "CVE-2025-38369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
    },
    {
      "name": "CVE-2025-38373",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
    },
    {
      "name": "CVE-2025-38376",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
    },
    {
      "name": "CVE-2025-38392",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
    },
    {
      "name": "CVE-2025-38414",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
    },
    {
      "name": "CVE-2025-38417",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
    },
    {
      "name": "CVE-2025-38427",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
    },
    {
      "name": "CVE-2025-38429",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
    },
    {
      "name": "CVE-2025-38436",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
    },
    {
      "name": "CVE-2025-6965",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
    },
    {
      "name": "CVE-2024-13009",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
    },
    {
      "name": "CVE-2025-4674",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
    },
    {
      "name": "CVE-2025-47907",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
    },
    {
      "name": "CVE-2025-55163",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
    },
    {
      "name": "CVE-2025-8941",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
    },
    {
      "name": "CVE-2016-0682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
    },
    {
      "name": "CVE-2016-0689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
    },
    {
      "name": "CVE-2016-0692",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
    },
    {
      "name": "CVE-2016-0694",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
    },
    {
      "name": "CVE-2016-3418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
    },
    {
      "name": "CVE-2017-10140",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
    },
    {
      "name": "CVE-2017-3604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
    },
    {
      "name": "CVE-2017-3605",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
    },
    {
      "name": "CVE-2017-3606",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
    },
    {
      "name": "CVE-2017-3607",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
    },
    {
      "name": "CVE-2017-3608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
    },
    {
      "name": "CVE-2017-3609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
    },
    {
      "name": "CVE-2017-3610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
    },
    {
      "name": "CVE-2017-3611",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
    },
    {
      "name": "CVE-2017-3612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
    },
    {
      "name": "CVE-2017-3613",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
    },
    {
      "name": "CVE-2017-3614",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
    },
    {
      "name": "CVE-2017-3615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
    },
    {
      "name": "CVE-2017-3616",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
    },
    {
      "name": "CVE-2017-3617",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
    },
    {
      "name": "CVE-2020-2981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
    },
    {
      "name": "CVE-2022-3219",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
    },
    {
      "name": "CVE-2023-39810",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
    },
    {
      "name": "CVE-2023-4156",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
    },
    {
      "name": "CVE-2023-47039",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
    },
    {
      "name": "CVE-2024-3220",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
    },
    {
      "name": "CVE-2024-58251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
    },
    {
      "name": "CVE-2025-1352",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
    },
    {
      "name": "CVE-2025-1365",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
    },
    {
      "name": "CVE-2025-1372",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
    },
    {
      "name": "CVE-2025-26519",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
    },
    {
      "name": "CVE-2025-27587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
    },
    {
      "name": "CVE-2025-30258",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
    },
    {
      "name": "CVE-2025-40909",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
    },
    {
      "name": "CVE-2025-45582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
    },
    {
      "name": "CVE-2025-45768",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
    },
    {
      "name": "CVE-2025-46394",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
    },
    {
      "name": "CVE-2025-49795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
    },
    {
      "name": "CVE-2025-5115",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
    },
    {
      "name": "CVE-2025-5222",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
    },
    {
      "name": "CVE-2025-53864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
    },
    {
      "name": "CVE-2025-6170",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
    },
    {
      "name": "CVE-2025-8058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
    },
    {
      "name": "CVE-2025-8732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
    },
    {
      "name": "CVE-2025-10148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
    },
    {
      "name": "CVE-2025-9086",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
    },
    {
      "name": "CVE-2025-38125",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
    },
    {
      "name": "CVE-2025-38208",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
    },
    {
      "name": "CVE-2025-38503",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
    },
    {
      "name": "CVE-2025-38506",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
    },
    {
      "name": "CVE-2025-38510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
    },
    {
      "name": "CVE-2025-38512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
    },
    {
      "name": "CVE-2025-38513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
    },
    {
      "name": "CVE-2025-38515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
    },
    {
      "name": "CVE-2025-38516",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
    },
    {
      "name": "CVE-2025-38520",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
    },
    {
      "name": "CVE-2025-38524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
    },
    {
      "name": "CVE-2025-38528",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
    },
    {
      "name": "CVE-2025-38529",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
    },
    {
      "name": "CVE-2025-38530",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
    },
    {
      "name": "CVE-2025-38531",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
    },
    {
      "name": "CVE-2025-38535",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
    },
    {
      "name": "CVE-2025-38537",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
    },
    {
      "name": "CVE-2025-38538",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
    },
    {
      "name": "CVE-2025-38540",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
    },
    {
      "name": "CVE-2025-38543",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
    },
    {
      "name": "CVE-2025-38546",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
    },
    {
      "name": "CVE-2025-38548",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
    },
    {
      "name": "CVE-2025-38550",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
    },
    {
      "name": "CVE-2025-38553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
    },
    {
      "name": "CVE-2025-38555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
    },
    {
      "name": "CVE-2025-38560",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
    },
    {
      "name": "CVE-2025-38566",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
    },
    {
      "name": "CVE-2025-38568",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
    },
    {
      "name": "CVE-2025-38571",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
    },
    {
      "name": "CVE-2025-38572",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
    },
    {
      "name": "CVE-2025-38576",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
    },
    {
      "name": "CVE-2025-38581",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
    },
    {
      "name": "CVE-2025-38582",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
    },
    {
      "name": "CVE-2025-38583",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
    },
    {
      "name": "CVE-2025-38585",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
    },
    {
      "name": "CVE-2025-38587",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
    },
    {
      "name": "CVE-2025-38588",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
    },
    {
      "name": "CVE-2025-38601",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
    },
    {
      "name": "CVE-2025-38602",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
    },
    {
      "name": "CVE-2025-38604",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
    },
    {
      "name": "CVE-2025-38608",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
    },
    {
      "name": "CVE-2025-38609",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
    },
    {
      "name": "CVE-2025-38610",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
    },
    {
      "name": "CVE-2025-38612",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
    },
    {
      "name": "CVE-2025-38624",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
    },
    {
      "name": "CVE-2025-38630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
    },
    {
      "name": "CVE-2025-38632",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
    },
    {
      "name": "CVE-2025-38634",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
    },
    {
      "name": "CVE-2025-38635",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
    },
    {
      "name": "CVE-2025-38644",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
    },
    {
      "name": "CVE-2025-38646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
    },
    {
      "name": "CVE-2025-38650",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
    },
    {
      "name": "CVE-2025-38663",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
    },
    {
      "name": "CVE-2025-38665",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
    },
    {
      "name": "CVE-2025-38670",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
    },
    {
      "name": "CVE-2025-38671",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
    },
    {
      "name": "CVE-2025-47913",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
    },
    {
      "name": "CVE-2025-55198",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
    },
    {
      "name": "CVE-2025-55199",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
    },
    {
      "name": "CVE-2025-12194",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
    },
    {
      "name": "CVE-2025-31133",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
    },
    {
      "name": "CVE-2025-47914",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
    },
    {
      "name": "CVE-2025-52565",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
    },
    {
      "name": "CVE-2025-58181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
    },
    {
      "name": "CVE-2025-40231",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
    },
    {
      "name": "CVE-2025-62727",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
    },
    {
      "name": "CVE-2025-13034",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
    },
    {
      "name": "CVE-2025-14017",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
    },
    {
      "name": "CVE-2025-14524",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
    },
    {
      "name": "CVE-2025-14819",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
    },
    {
      "name": "CVE-2025-15079",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
    },
    {
      "name": "CVE-2025-15224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
    },
    {
      "name": "CVE-2025-67735",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
    },
    {
      "name": "CVE-2025-15467",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
    },
    {
      "name": "CVE-2025-68160",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
    },
    {
      "name": "CVE-2025-69418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
    },
    {
      "name": "CVE-2025-69419",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
    },
    {
      "name": "CVE-2025-69420",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
    },
    {
      "name": "CVE-2025-69421",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
    },
    {
      "name": "CVE-2026-22795",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
    },
    {
      "name": "CVE-2026-22796",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
    },
    {
      "name": "CVE-2026-0900",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
    },
    {
      "name": "CVE-2026-0902",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
    },
    {
      "name": "CVE-2025-62408",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
    },
    {
      "name": "CVE-2026-21925",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
    },
    {
      "name": "CVE-2026-21932",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
    },
    {
      "name": "CVE-2026-21933",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
    },
    {
      "name": "CVE-2026-21945",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
    },
    {
      "name": "CVE-2025-11083",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
    },
    {
      "name": "CVE-2025-66418",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
    },
    {
      "name": "CVE-2025-66471",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
    },
    {
      "name": "CVE-2026-21441",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
    },
    {
      "name": "CVE-2025-12383",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
    },
    {
      "name": "CVE-2025-11468",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
    },
    {
      "name": "CVE-2025-15282",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
    },
    {
      "name": "CVE-2025-15366",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
    },
    {
      "name": "CVE-2025-15367",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
    },
    {
      "name": "CVE-2026-0672",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
    },
    {
      "name": "CVE-2026-0865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
    },
    {
      "name": "CVE-2025-11494",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
    },
    {
      "name": "CVE-2025-14087",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
    },
    {
      "name": "CVE-2025-14512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
    },
    {
      "name": "CVE-2025-28162",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
    },
    {
      "name": "CVE-2025-28164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
    },
    {
      "name": "CVE-2025-64718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
    },
    {
      "name": "CVE-2025-68973",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
    },
    {
      "name": "CVE-2025-8959",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
    },
    {
      "name": "CVE-2026-1484",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
    },
    {
      "name": "CVE-2026-1485",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
    },
    {
      "name": "CVE-2026-1489",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
    },
    {
      "name": "CVE-2025-40346",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
    },
    {
      "name": "CVE-2025-40349",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
    },
    {
      "name": "CVE-2025-40351",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
    },
    {
      "name": "CVE-2025-68249",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
    },
    {
      "name": "CVE-2025-68750",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
    },
    {
      "name": "CVE-2026-24515",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
    },
    {
      "name": "CVE-2026-25210",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
    },
    {
      "name": "CVE-2025-38704",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
    },
    {
      "name": "CVE-2026-2003",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
    },
    {
      "name": "CVE-2026-2004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
    },
    {
      "name": "CVE-2026-2005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
    },
    {
      "name": "CVE-2026-2006",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
    },
    {
      "name": "CVE-2026-2007",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
    },
    {
      "name": "CVE-2025-38688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
    },
    {
      "name": "CVE-2025-38716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
    },
    {
      "name": "CVE-2025-39753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
    },
    {
      "name": "CVE-2025-68121",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
    },
    {
      "name": "CVE-2025-14104",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
    },
    {
      "name": "CVE-2025-61726",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
    },
    {
      "name": "CVE-2025-61728",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
    },
    {
      "name": "CVE-2025-61730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
    },
    {
      "name": "CVE-2025-61731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
    },
    {
      "name": "CVE-2025-61732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
    },
    {
      "name": "CVE-2025-68119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
    },
    {
      "name": "CVE-2025-11065",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
    },
    {
      "name": "CVE-2025-13151",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
    },
    {
      "name": "CVE-2025-15281",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
    },
    {
      "name": "CVE-2025-22873",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
    },
    {
      "name": "CVE-2025-60876",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
    },
    {
      "name": "CVE-2025-66564",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
    },
    {
      "name": "CVE-2026-0861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
    },
    {
      "name": "CVE-2026-0915",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
    },
    {
      "name": "CVE-2026-0988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
    },
    {
      "name": "CVE-2026-0989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
    },
    {
      "name": "CVE-2026-0990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
    },
    {
      "name": "CVE-2026-0992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
    },
    {
      "name": "CVE-2026-22695",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
    },
    {
      "name": "CVE-2026-22801",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
    },
    {
      "name": "CVE-2026-23490",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
    },
    {
      "name": "CVE-2026-25547",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
    },
    {
      "name": "CVE-2026-25646",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
    },
    {
      "name": "CVE-2017-20052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
    },
    {
      "name": "CVE-2018-9996",
      "url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
    },
    {
      "name": "CVE-2019-9076",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
    },
    {
      "name": "CVE-2021-20205",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
    },
    {
      "name": "CVE-2021-20284",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
    },
    {
      "name": "CVE-2021-29390",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
    },
    {
      "name": "CVE-2021-3549",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
    },
    {
      "name": "CVE-2021-46822",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
    },
    {
      "name": "CVE-2022-2255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
    },
    {
      "name": "CVE-2022-35206",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
    },
    {
      "name": "CVE-2022-3970",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
    },
    {
      "name": "CVE-2022-47673",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
    },
    {
      "name": "CVE-2022-47696",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
    },
    {
      "name": "CVE-2022-48064",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
    },
    {
      "name": "CVE-2022-49920",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
    },
    {
      "name": "CVE-2023-25586",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
    },
    {
      "name": "CVE-2023-26966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
    },
    {
      "name": "CVE-2023-32181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
    },
    {
      "name": "CVE-2023-33285",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
    },
    {
      "name": "CVE-2023-34410",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
    },
    {
      "name": "CVE-2023-36660",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
    },
    {
      "name": "CVE-2023-37369",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
    },
    {
      "name": "CVE-2023-38197",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
    },
    {
      "name": "CVE-2023-53164",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
    },
    {
      "name": "CVE-2024-48615",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
    },
    {
      "name": "CVE-2024-53589",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
    },
    {
      "name": "CVE-2025-0840",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
    },
    {
      "name": "CVE-2025-11081",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
    },
    {
      "name": "CVE-2025-11082",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
    },
    {
      "name": "CVE-2025-1148",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
    },
    {
      "name": "CVE-2025-1149",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
    },
    {
      "name": "CVE-2025-1176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
    },
    {
      "name": "CVE-2025-1178",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
    },
    {
      "name": "CVE-2025-1179",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
    },
    {
      "name": "CVE-2025-1180",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
    },
    {
      "name": "CVE-2025-1181",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
    },
    {
      "name": "CVE-2025-1182",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
    },
    {
      "name": "CVE-2025-11966",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
    },
    {
      "name": "CVE-2025-12119",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
    },
    {
      "name": "CVE-2025-29480",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
    },
    {
      "name": "CVE-2025-47911",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
    },
    {
      "name": "CVE-2025-5244",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
    },
    {
      "name": "CVE-2025-58190",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
    },
    {
      "name": "CVE-2025-60753",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
    },
    {
      "name": "CVE-2025-6176",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
    },
    {
      "name": "CVE-2025-64702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
    },
    {
      "name": "CVE-2025-66861",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
    },
    {
      "name": "CVE-2025-66862",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
    },
    {
      "name": "CVE-2025-66863",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
    },
    {
      "name": "CVE-2025-66864",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
    },
    {
      "name": "CVE-2025-66865",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
    },
    {
      "name": "CVE-2025-66866",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
    },
    {
      "name": "CVE-2025-68972",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
    },
    {
      "name": "CVE-2025-8224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
    },
    {
      "name": "CVE-2025-8225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
    },
    {
      "name": "CVE-2026-0994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
    },
    {
      "name": "CVE-2026-1002",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
    },
    {
      "name": "CVE-2026-22184",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
    },
    {
      "name": "CVE-2026-22715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
    },
    {
      "name": "CVE-2026-22716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
    },
    {
      "name": "CVE-2026-22717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
    },
    {
      "name": "CVE-2026-22722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
    }
  ],
  "initial_release_date": "2026-02-26T00:00:00",
  "last_revision_date": "2026-02-26T00:00:00",
  "links": [],
  "reference": "CERTFR-2026-AVI-0218",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2026-02-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
    },
    {
      "published_at": "2026-02-26",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
    },
    {
      "published_at": "2026-02-26",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
    },
    {
      "published_at": "2026-02-26",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
    },
    {
      "published_at": "2026-02-25",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
    }
  ]
}

CERTFR-2025-AVI-0592
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
VMware Telco Cloud Infrastructure Telco Cloud Infrastructure versions 3.x et 2.x sans le correctif ESXi70U3w-24784741
VMware Cloud Foundation Cloud Foundation et vSphere Foundation versions 9.0.0.0 sans le correctif ESXi-9.0.0.0100-24813472
VMware Fusion Fusion versions 13.x antérieures à 13.6.4
VMware Telco Cloud Platform Telco Cloud Platform versions 3.x et 2.x sans le correctif ESXi70U3w-24784741
VMware Cloud Foundation Cloud Foundation versions 5.x sans le correctif ESXi80U3f-24784735
VMware Workstation Worstation versions 17.x antérieures à 17.6.4
VMware VMware Tools VMware Tools versions 13.x.x antérieures à 13.0.1.0 pour Windows
VMware ESXi ESXI versions 7.0 sans le correctif ESXi70U3w-24784741
VMware VMware Tools VMware Tools versions antérieures à 12.5.3 pour Windows
VMware Cloud Foundation Cloud Foundation versions 4.5.x sans le correctif ESXi70U3w-24784741
VMware ESXi ESXI versions 8.0 sans les correctifs ESXi80U3f-24784735 et ESXi80U2e-24789317
References
Bulletin de sécurité VMware 35877 2025-07-15 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Telco Cloud Infrastructure versions 3.x et 2.x sans le correctif ESXi70U3w-24784741",
      "product": {
        "name": "Telco Cloud Infrastructure",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation et vSphere Foundation versions 9.0.0.0 sans le correctif ESXi-9.0.0.0100-24813472",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions 13.x ant\u00e9rieures \u00e0 13.6.4",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Telco Cloud Platform versions  3.x et 2.x sans le correctif ESXi70U3w-24784741",
      "product": {
        "name": "Telco Cloud Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation versions 5.x sans le correctif ESXi80U3f-24784735",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Worstation versions 17.x ant\u00e9rieures \u00e0 17.6.4",
      "product": {
        "name": "Workstation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Tools versions 13.x.x ant\u00e9rieures \u00e0 13.0.1.0 pour Windows",
      "product": {
        "name": "VMware Tools",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXI versions 7.0 sans le correctif ESXi70U3w-24784741",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Tools versions ant\u00e9rieures \u00e0 12.5.3 pour Windows",
      "product": {
        "name": "VMware Tools",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation versions 4.5.x sans le correctif ESXi70U3w-24784741",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXI versions 8.0 sans les correctifs ESXi80U3f-24784735 et  ESXi80U2e-24789317",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-41236",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41236"
    },
    {
      "name": "CVE-2025-41237",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41237"
    },
    {
      "name": "CVE-2025-41238",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41238"
    },
    {
      "name": "CVE-2025-41239",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41239"
    }
  ],
  "initial_release_date": "2025-07-16T00:00:00",
  "last_revision_date": "2025-07-16T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0592",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-07-16T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-07-15",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 35877",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877"
    }
  ]
}

CERTFR-2025-AVI-0430
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une injection de code indirecte à distance (XSS).

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
VMware Telco Cloud Platform Telco Cloud Platform sans le correctif de sécurité 8.0 U3e pour vCenter
VMware Telco Cloud Infrastructure Telco Cloud Infrastructure versions 3.x sans le correctif de sécurité ESXi80U3se-24659227 pour ESXi
VMware ESXi ESXi versions 8.0 sans le correctif de sécurité ESXi80U3se-24659227
VMware Cloud Foundation Cloud Foundation versions 5.x sans le correctif de sécurité ESXi80U3se-24659227 pour ESXi
VMware Telco Cloud Platform Telco Cloud Platform sans le correctif de sécurité ESXi80U3se-24659227 pour ESXi
VMware Telco Cloud Infrastructure Telco Cloud Infrastructure versions 3.x sans le correctif de sécurité 8.0 U3e pour vCenter
VMware Fusion Fusion versions 13.x antérieures à 13.6.3 sur macOS
VMware vCenter Server vCenter Server versions 7.0 sans le correctif de sécurité 7.0 U3v
VMware Cloud Foundation Cloud Foundation versions 4.5.x sans le correctif de sécurité 7.0 U3v pour vCenter
VMware Workstation Workstation versions 17.x antérieures à 17.6.3
VMware Telco Cloud Infrastructure Telco Cloud Infrastructure versions 2.x sans le correctif de sécurité 7.0 U3v pour vCenter
VMware vCenter Server vCenter Server versions 8.0 sans le correctif de sécurité 8.0 U3e
VMware Cloud Foundation Cloud Foundation versions 5.x sans le correctif de sécurité 8.0 U3e pour vCenter
VMware Cloud Foundation Cloud Foundation versions 4.5.x sans le correctif de sécurité ESXi70U3sv-24723868 pour ESXi
VMware Telco Cloud Infrastructure Telco Cloud Infrastructure versions 2.x sans le correctif de sécurité ESXi70U3sv-24723868 pour ESXi
VMware ESXi ESXi versions 7.0 sans le correctif de sécurité ESXi70U3sv-24723868
References
Bulletin de sécurité VMware 25717 2025-05-20 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Telco Cloud Platform sans le correctif de s\u00e9curit\u00e9 8.0 U3e pour vCenter",
      "product": {
        "name": "Telco Cloud Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Telco Cloud Infrastructure versions 3.x sans le correctif de s\u00e9curit\u00e9 ESXi80U3se-24659227 pour ESXi",
      "product": {
        "name": "Telco Cloud Infrastructure",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi versions 8.0 sans le correctif de s\u00e9curit\u00e9 ESXi80U3se-24659227",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation versions 5.x sans le correctif de s\u00e9curit\u00e9 ESXi80U3se-24659227 pour ESXi",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Telco Cloud Platform sans le correctif de s\u00e9curit\u00e9 ESXi80U3se-24659227 pour ESXi",
      "product": {
        "name": "Telco Cloud Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Telco Cloud Infrastructure versions 3.x sans le correctif de s\u00e9curit\u00e9 8.0 U3e pour vCenter",
      "product": {
        "name": "Telco Cloud Infrastructure",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions 13.x ant\u00e9rieures \u00e0 13.6.3 sur macOS",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "vCenter Server versions 7.0 sans le correctif de s\u00e9curit\u00e9 7.0 U3v",
      "product": {
        "name": "vCenter Server",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation versions 4.5.x sans le correctif de s\u00e9curit\u00e9 7.0 U3v pour vCenter",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Workstation versions 17.x ant\u00e9rieures \u00e0 17.6.3",
      "product": {
        "name": "Workstation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Telco Cloud Infrastructure versions 2.x sans le correctif de s\u00e9curit\u00e9 7.0 U3v pour vCenter",
      "product": {
        "name": "Telco Cloud Infrastructure",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "vCenter Server versions 8.0 sans le correctif de s\u00e9curit\u00e9 8.0 U3e",
      "product": {
        "name": "vCenter Server",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation versions 5.x sans le correctif de s\u00e9curit\u00e9 8.0 U3e pour vCenter",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation versions 4.5.x sans le correctif de s\u00e9curit\u00e9 ESXi70U3sv-24723868 pour ESXi",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Telco Cloud Infrastructure versions 2.x sans le correctif de s\u00e9curit\u00e9 ESXi70U3sv-24723868 pour ESXi",
      "product": {
        "name": "Telco Cloud Infrastructure",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi versions 7.0 sans le correctif de s\u00e9curit\u00e9 ESXi70U3sv-24723868",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-41227",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41227"
    },
    {
      "name": "CVE-2025-41225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41225"
    },
    {
      "name": "CVE-2025-41228",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41228"
    },
    {
      "name": "CVE-2025-41226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-41226"
    }
  ],
  "initial_release_date": "2025-05-21T00:00:00",
  "last_revision_date": "2025-05-21T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0430",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-05-21T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Injection de code indirecte \u00e0 distance (XSS)"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une injection de code indirecte \u00e0 distance (XSS).",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-05-20",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 25717",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717"
    }
  ]
}

CERTFR-2025-AVI-0177
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.

VMware indique que les vulnérabilités CVE-2025-222234, CVE-2025-22225 et CVE-2025-22226 sont activement exploitées.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
VMware Cloud Foundation VMware Cloud Foundation versions 4.5.x sans le correctif de sécurité ESXi70U3s-24585291
VMware Telco Cloud Platform VMware Telco Cloud Platorm sans le correctif de sécurité KB389385
VMware ESXi VMware ESXi versions 7.0 sans le correctif de sécurité ESXi70U3s-24585291
VMware Cloud Foundation VMware Cloud Foundation versions 5.x sans le correctif de sécurité ESXi80U3d-24585383
VMware Fusion VMware Fusion 13.x versions antérieures à 13.6.3
VMware ESXi VMware ESXi versions 8.0 sans le correctif de sécurité ESXi80U2d-24585300 ou ESXi80U3d-24585383
VMware Telco Cloud Infrastructure VMware Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB389385
VMware Workstation VMware Workstation versions 17.x antérieures à 17.6.3
References
Bulletin de sécurité VMware 25466 2025-03-04 vendor-advisory
Bulletin de sécurité VMware 25390 2025-03-04 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Cloud Foundation versions 4.5.x sans le correctif de s\u00e9curit\u00e9 ESXi70U3s-24585291",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Telco Cloud Platorm sans le correctif de s\u00e9curit\u00e9 KB389385",
      "product": {
        "name": "Telco Cloud Platform",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 7.0 sans le correctif de s\u00e9curit\u00e9 ESXi70U3s-24585291",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation versions 5.x sans le correctif de s\u00e9curit\u00e9 ESXi80U3d-24585383",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Fusion 13.x versions ant\u00e9rieures \u00e0 13.6.3",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 8.0  sans le correctif de s\u00e9curit\u00e9 ESXi80U2d-24585300 ou ESXi80U3d-24585383",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9  KB389385",
      "product": {
        "name": "Telco Cloud Infrastructure",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Workstation versions 17.x ant\u00e9rieures \u00e0 17.6.3",
      "product": {
        "name": "Workstation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2025-22224",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22224"
    },
    {
      "name": "CVE-2024-38814",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38814"
    },
    {
      "name": "CVE-2025-22226",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22226"
    },
    {
      "name": "CVE-2025-22225",
      "url": "https://www.cve.org/CVERecord?id=CVE-2025-22225"
    }
  ],
  "initial_release_date": "2025-03-05T00:00:00",
  "last_revision_date": "2025-03-05T00:00:00",
  "links": [],
  "reference": "CERTFR-2025-AVI-0177",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2025-03-05T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Contournement de la politique de s\u00e9curit\u00e9"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.\n\nVMware indique que les vuln\u00e9rabilit\u00e9s CVE-2025-222234, CVE-2025-22225 et  CVE-2025-22226 sont activement exploit\u00e9es.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2025-03-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 25466",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25466"
    },
    {
      "published_at": "2025-03-04",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 25390",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
    }
  ]
}

CERTFR-2024-AVI-0732
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans VMware Fusion. Elle permet à un attaquant de provoquer une exécution de code arbitraire.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
VMware Fusion Fusion versions 13.x antérieures à 13.6 sur MacOS
References
Bulletin de sécurité VMware 24939 2024-09-03 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Fusion versions 13.x ant\u00e9rieures \u00e0 13.6 sur MacOS",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-38811",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-38811"
    }
  ],
  "initial_release_date": "2024-09-03T00:00:00",
  "last_revision_date": "2024-09-03T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0732",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-09-03T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans VMware Fusion. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire.",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2024-09-03",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 24939",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24939"
    }
  ]
}

CERTFR-2024-AVI-0427
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et un déni de service à distance.

Solutions

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

Impacted products
Vendor Product Description
VMware Fusion Fusion versions 13.x antérieures à 13.5.1 (la version la plus récente est 13.5.2)
VMware ESXi ESXi versions 7.x antérieures à 7.0 Update 3q
VMware vCenter Server vCenter Server versions 7.x antérieures à 7.0 Update 3q
VMware N/A Workstation versions 17.x antérieures à 17.5.1 (la version la plus récente est 17.5.2)
VMware N/A Cloud Foundation (ESXi et vCenter Server) versions 4.x sans le dernier correctif de sécurité
VMware vCenter Server vCenter Server versions 8.x antérieures à 8.0 Update 2b
VMware N/A Cloud Foundation (ESXi et vCenter Server) versions 5.x antérieures à 5.1.1
VMware ESXi ESXi versions 8.x antérieures à 8.0 Update 2b
References
Bulletin de sécurité VMware 24308 2024-05-21 vendor-advisory

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Fusion versions 13.x ant\u00e9rieures \u00e0 13.5.1 (la version la plus r\u00e9cente est 13.5.2)",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi versions 7.x ant\u00e9rieures \u00e0 7.0 Update 3q",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "vCenter Server versions 7.x ant\u00e9rieures \u00e0 7.0 Update 3q",
      "product": {
        "name": "vCenter Server",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Workstation versions 17.x ant\u00e9rieures \u00e0 17.5.1 (la version la plus r\u00e9cente est 17.5.2)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation (ESXi et vCenter Server) versions 4.x sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "vCenter Server versions 8.x ant\u00e9rieures \u00e0 8.0 Update 2b",
      "product": {
        "name": "vCenter Server",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation (ESXi et vCenter Server) versions 5.x ant\u00e9rieures \u00e0 5.1.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi versions 8.x ant\u00e9rieures \u00e0 8.0 Update 2b",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": "",
  "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
  "cves": [
    {
      "name": "CVE-2024-22275",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22275"
    },
    {
      "name": "CVE-2024-22273",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22273"
    },
    {
      "name": "CVE-2024-22274",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22274"
    }
  ],
  "initial_release_date": "2024-05-22T00:00:00",
  "last_revision_date": "2024-05-22T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0427",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-22T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un d\u00e9ni de service \u00e0 distance.",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": "2024-05-21",
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 24308",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308"
    }
  ]
}

CERTFR-2024-AVI-0405
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A VMware Workstation Pro et Player versions 17.x antérieures à 17.5.2
VMware Fusion VMware Fusion versions 13.x antérieures à 13.5.2
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Workstation Pro et Player versions 17.x ant\u00e9rieures \u00e0 17.5.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Fusion versions 13.x ant\u00e9rieures \u00e0 13.5.2",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-22267",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22267"
    },
    {
      "name": "CVE-2024-22269",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22269"
    },
    {
      "name": "CVE-2024-22268",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22268"
    },
    {
      "name": "CVE-2024-22270",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22270"
    }
  ],
  "initial_release_date": "2024-05-15T00:00:00",
  "last_revision_date": "2024-05-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0405",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-05-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 24280 (VMSA-2024-0010) du 14 mai 2024",
      "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280"
    }
  ]
}

CERTFR-2024-AVI-0186
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.

Solution

Se référer aux mesures de contournement proposées par l’éditeur (cf. section Documentation).

Contournement provisoire

Se référer au bulletin de sécurité de l'éditeur pour les mesures de contournement (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware ESXi ESXi versions 7.0 sans le correctif de sécurité ESXi70U3p-23307199
VMware N/A Workstation versions 17.x antérieures à 17.5.1
VMware Fusion Fusion versions 13.x antérieures à 13.5.1 sur MacOS
VMware N/A VMware Cloud Foundation (ESXi) versions 5.x et 4.x sans le correctif de sécurité KB88287
VMware ESXi ESXi versions 8.0 sans les correctifs de sécurité ESXi80U1d-23299997 et ESXi80U2sb-23305545

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "ESXi versions 7.0 sans le correctif de s\u00e9curit\u00e9 ESXi70U3p-23307199",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Workstation versions 17.x ant\u00e9rieures \u00e0 17.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions 13.x ant\u00e9rieures \u00e0 13.5.1 sur MacOS",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation (ESXi) versions 5.x et 4.x sans le correctif de s\u00e9curit\u00e9 KB88287",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi versions 8.0 sans les correctifs de s\u00e9curit\u00e9 ESXi80U1d-23299997 et ESXi80U2sb-23305545",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer aux mesures de contournement propos\u00e9es par l\u2019\u00e9diteur (cf.\nsection Documentation).\n\n## Contournement provisoire\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour les mesures de\ncontournement (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-22252",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22252"
    },
    {
      "name": "CVE-2024-22253",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22253"
    },
    {
      "name": "CVE-2024-22255",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22255"
    },
    {
      "name": "CVE-2024-22254",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22254"
    }
  ],
  "initial_release_date": "2024-03-06T00:00:00",
  "last_revision_date": "2024-03-06T00:00:00",
  "links": [
    {
      "title": "How to remove USB controllers from a Virtual Machine",
      "url": "https://kb.vmware.com/s/article/96682"
    }
  ],
  "reference": "CERTFR-2024-AVI-0186",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-03-06T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits VMware\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2024-0006 du 05 mars 2024",
      "url": "https://www.vmware.com/security/advisories/VMSA-2024-0006.html"
    }
  ]
}

CERTFR-2024-AVI-0169
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits VMware. Elle permet à un attaquant de provoquer une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A Workstation Pro versions antérieures à 17.5.1
VMware Fusion Fusion versions antérieures à 13.5.1
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Workstation Pro versions ant\u00e9rieures \u00e0 17.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions ant\u00e9rieures \u00e0 13.5.1",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2024-22251",
      "url": "https://www.cve.org/CVERecord?id=CVE-2024-22251"
    }
  ],
  "initial_release_date": "2024-02-28T00:00:00",
  "last_revision_date": "2024-02-28T00:00:00",
  "links": [],
  "reference": "CERTFR-2024-AVI-0169",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2024-02-28T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eles\nproduits VMware\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2024-0005 du 27 f\u00e9vrier 2024",
      "url": "https://www.vmware.com/security/advisories/VMSA-2024-0005.html"
    }
  ]
}

CERTFR-2023-AVI-0870
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A VMware Aria Operations for Logs versions 8.x antérieures à 8.14
VMware Cloud Foundation VMware Cloud Foundation (VMware Aria Operations for Logs) versions 5.x et 4.x (se référer au KB95212 de l'éditeur)
VMware Fusion Fusion versions 13.x antérieures à 13.5 sur OS X
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Aria Operations for Logs versions 8.x ant\u00e9rieures \u00e0 8.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation (VMware Aria Operations for Logs) versions 5.x et 4.x (se r\u00e9f\u00e9rer au KB95212 de l\u0027\u00e9diteur)",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions 13.x ant\u00e9rieures \u00e0 13.5 sur OS X",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-34052",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34052"
    },
    {
      "name": "CVE-2023-34051",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34051"
    },
    {
      "name": "CVE-2023-34045",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34045"
    },
    {
      "name": "CVE-2023-34044",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34044"
    },
    {
      "name": "CVE-2023-34046",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-34046"
    }
  ],
  "initial_release_date": "2023-10-20T00:00:00",
  "last_revision_date": "2023-10-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0870",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-10-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2023-0021 du 19 octobre 2023",
      "url": "https://www.vmware.com/security/advisories/VMSA-2023-0021.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2023-0022 du 19 octobre 2023",
      "url": "https://www.vmware.com/security/advisories/VMSA-2023-0022.html"
    }
  ]
}

CERTFR-2023-AVI-0342
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans VMware. Elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une élévation de privilèges et une exécution de code arbitraire.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware Fusion VMware Fusion versions 13.x antérieures à 13.0.2
VMware N/A VMware Workstation versions 17.x antérieures à 17.0.2
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Fusion versions 13.x ant\u00e9rieures \u00e0 13.0.2",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Workstation versions 17.x ant\u00e9rieures \u00e0 17.0.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2023-20869",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20869"
    },
    {
      "name": "CVE-2023-20870",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20870"
    },
    {
      "name": "CVE-2023-20872",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20872"
    },
    {
      "name": "CVE-2023-20871",
      "url": "https://www.cve.org/CVERecord?id=CVE-2023-20871"
    }
  ],
  "initial_release_date": "2023-04-26T00:00:00",
  "last_revision_date": "2023-04-26T00:00:00",
  "links": [],
  "reference": "CERTFR-2023-AVI-0342",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2023-04-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eVMware\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es, une \u00e9l\u00e9vation\nde privil\u00e8ges et une ex\u00e9cution de code arbitraire.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Vmware VMSA-2023-0008 du 25 avril 2023",
      "url": "https://www.vmware.com/security/advisories/VMSA-2023-0008.html"
    }
  ]
}

CERTFR-2022-AVI-1096
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A Access versions 22.09.0.0 versions antérieures à 22.09.1.0 (pour Linux)
VMware Cloud Foundation VMware Cloud Foundation (vIDM) toutes versions sans le correctif KB90384
VMware N/A VMware vRealize Network Insight (vRNI) versions 6.3 antérieures à 6.3 HF
VMware N/A VMware vRealize Network Insight (vRNI) versions 6.6 antérieures à 6.6 HF
VMware N/A VMware vRealize Network Insight (vRNI) versions 6.5.x antérieures à 6.5.x HF
VMware N/A Cloud Foundation (ESXi) versions 4.x/3.x sans le correctif KB90336
VMware N/A VMware vRealize Network Insight (vRNI) versions 6.7 antérieures à 6.7 HF
VMware N/A Access versions 21.08.0.1, 21.08.0.0 sans le correctif KB90399 (pour Linux)
VMware N/A VMware vRealize Network Insight (vRNI) versions 6.4 antérieures à 6.4 HF
VMware N/A Workstation versions 16.x antérieures à 16.2.5
VMware Fusion Fusion versions 12.x antérieures à 12.2.5 (pour OS X)
VMware ESXi ESXi versions 8.0 sans le correctif ESXi80a-20842819
VMware ESXi ESXi versions 7.0 sans le correctif ESXi70U3si-20841705
VMware N/A VMware vRealize Network Insight (vRNI) versions 6.2 antérieures à 6.2 HF
VMware N/A vIDM versions 3.3.6 sans le correctif KB90399 (pour Linux)

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Access versions 22.09.0.0 versions ant\u00e9rieures \u00e0 22.09.1.0 (pour Linux)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation (vIDM) toutes versions sans le correctif KB90384",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vRealize Network Insight (vRNI) versions 6.3 ant\u00e9rieures \u00e0 6.3 HF",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vRealize Network Insight (vRNI) versions 6.6 ant\u00e9rieures \u00e0 6.6 HF",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vRealize Network Insight (vRNI) versions 6.5.x ant\u00e9rieures \u00e0 6.5.x HF",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Cloud Foundation (ESXi) versions 4.x/3.x sans le correctif KB90336",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vRealize Network Insight (vRNI) versions 6.7 ant\u00e9rieures \u00e0 6.7 HF",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Access versions 21.08.0.1, 21.08.0.0 sans le correctif KB90399 (pour Linux)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vRealize Network Insight (vRNI) versions 6.4 ant\u00e9rieures \u00e0 6.4 HF",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Workstation versions 16.x ant\u00e9rieures \u00e0 16.2.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions 12.x ant\u00e9rieures \u00e0 12.2.5 (pour OS X)",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi versions 8.0 sans le correctif ESXi80a-20842819",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi versions 7.0 sans le correctif ESXi70U3si-20841705",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware vRealize Network Insight (vRNI) versions 6.2 ant\u00e9rieures \u00e0 6.2 HF",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "vIDM versions 3.3.6 sans le correctif KB90399 (pour Linux)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2022-31703",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31703"
    },
    {
      "name": "CVE-2022-31705",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31705"
    },
    {
      "name": "CVE-2022-31701",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31701"
    },
    {
      "name": "CVE-2022-31700",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31700"
    },
    {
      "name": "CVE-2022-31702",
      "url": "https://www.cve.org/CVERecord?id=CVE-2022-31702"
    }
  ],
  "initial_release_date": "2022-12-14T00:00:00",
  "last_revision_date": "2022-12-14T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-1096",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-12-14T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des\ndonn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2022-0031 du 13 d\u00e9cembre 2022",
      "url": "https://www.vmware.com/security/advisories/VMSA-2022-0031.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2022-0032 du 13 d\u00e9cembre 2022",
      "url": "https://www.vmware.com/security/advisories/VMSA-2022-0032.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2022-0033 du 13 d\u00e9cembre 2022",
      "url": "https://www.vmware.com/security/advisories/VMSA-2022-0033.html"
    }
  ]
}

CERTFR-2022-AVI-148
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware Fusion VMware Fusion versions 12.x antérieures à 12.2.1
VMware ESXi VMware ESXi versions 6.5 antérieures à ESXi650-202202401-SG ou ESXi650-202110101-SG
VMware ESXi VMware ESXi versions 7.0 U2 antérieures à ESXi70U2e-19290878
VMware N/A VMware Workstation versions 16.x antérieures à 16.2.1
VMware ESXi VMware ESXi versions 6.7 antérieures à ESXi670-202111101-SG
VMware ESXi VMware ESXi versions 7.0 U1 antérieures à ESXi70U1e-19324898
VMware ESXi VMware ESXi versions 7.0 U3 antérieures à ESXi70U3c-19193900
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Fusion versions 12.x ant\u00e9rieures \u00e0 12.2.1",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 6.5 ant\u00e9rieures \u00e0 ESXi650-202202401-SG ou ESXi650-202110101-SG",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 7.0 U2 ant\u00e9rieures \u00e0 ESXi70U2e-19290878",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Workstation versions 16.x ant\u00e9rieures \u00e0 16.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 6.7 ant\u00e9rieures \u00e0 ESXi670-202111101-SG",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 7.0 U1 ant\u00e9rieures \u00e0 ESXi70U1e-19324898",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 7.0 U3 ant\u00e9rieures \u00e0 ESXi70U3c-19193900",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2021-22042",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22042"
    },
    {
      "name": "CVE-2021-22041",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22041"
    },
    {
      "name": "CVE-2021-22043",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22043"
    },
    {
      "name": "CVE-2021-22050",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22050"
    },
    {
      "name": "CVE-2021-22040",
      "url": "https://www.cve.org/CVERecord?id=CVE-2021-22040"
    }
  ],
  "initial_release_date": "2022-02-15T00:00:00",
  "last_revision_date": "2022-02-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2022-AVI-148",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2022-02-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware 2022-0004 du 15 f\u00e9vrier 2022",
      "url": "https://www.vmware.com/security/advisories/VMSA-2022-0004.html"
    }
  ]
}

CERTFR-2020-AVI-831
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits VMware. Elle permet à un attaquant de provoquer un déni de service.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware Fusion VMware Fusion versions 12.x antérieures à 12.0
VMware Cloud Foundation VMware Cloud Foundation versions 4.x
VMware N/A VMware Workstation versions 16.x antérieures à 16.0
VMware N/A VMware Workstation versions 15.x antérieures à 15.5.7
VMware Fusion VMware Fusion versions 11.x antérieures à 11.5.7
VMware ESXi VMware ESXi versions 7.x sans la mise à jour ESXi70U1c-17325551
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Fusion versions 12.x ant\u00e9rieures \u00e0 12.0",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation versions 4.x",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Workstation versions 16.x ant\u00e9rieures \u00e0 16.0",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Workstation versions 15.x ant\u00e9rieures \u00e0 15.5.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Fusion versions 11.x ant\u00e9rieures \u00e0 11.5.7",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 7.x sans la mise \u00e0 jour ESXi70U1c-17325551",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-3999",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3999"
    }
  ],
  "initial_release_date": "2020-12-18T00:00:00",
  "last_revision_date": "2020-12-18T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-831",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-12-18T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits VMware. Elle permet\n\u00e0 un attaquant de provoquer un d\u00e9ni de service.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 WMware VMSA-2020-0029 du 17 d\u00e9cembre 2020",
      "url": "https://www.vmware.com/security/advisories/VMSA-2020-0029.html"
    }
  ]
}

CERTFR-2020-AVI-767
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans VMware les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A VMware Workstation Pro / Player (Workstation) versions 15.x antérieures à 15.5.7
VMware ESXi VMware ESXi versions 7.x antérieures à ESXi70U1b-17168206
VMware Fusion VMware Fusion Pro / Fusion sur OS X versions 11.5.x antérieures à 11.5.7
VMware ESXi VMware ESXi versions 6.7.x antérieures à ESXi670-202011101-SG
VMware ESXi VMware ESXi versions 6.5.x antérieures à ESXi650-202011301-SG
VMware Cloud Foundation VMware Cloud Foundation versions 4.x
VMware Cloud Foundation VMware Cloud Foundation versions 3.x
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Workstation Pro / Player (Workstation) versions 15.x ant\u00e9rieures \u00e0 15.5.7",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 7.x ant\u00e9rieures \u00e0 ESXi70U1b-17168206",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Fusion Pro / Fusion sur OS X versions 11.5.x ant\u00e9rieures \u00e0 11.5.7",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 6.7.x ant\u00e9rieures \u00e0 ESXi670-202011101-SG",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware ESXi versions 6.5.x ant\u00e9rieures \u00e0 ESXi650-202011301-SG",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation versions 4.x",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation versions 3.x",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-4005",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-4005"
    },
    {
      "name": "CVE-2020-4004",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-4004"
    }
  ],
  "initial_release_date": "2020-11-20T00:00:00",
  "last_revision_date": "2020-11-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-767",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-11-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire et une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2020-0026 du 19 novembre 2020",
      "url": "https://www.vmware.com/security/advisories/VMSA-2020-0026.html"
    }
  ]
}

CERTFR-2020-AVI-658
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité et à la confidentialité des données.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A vCenter 6.7.x versions antérieures à 6.7 U3
VMware ESXi ESXi 7.0.x versions antérieures à ESXi_7.0.1-0.0.16850804
VMware N/A vCenter 6.5.x versions antérieures à 6.5 U3K
VMware Fusion Fusion 11.x versions antérieures à 11.5.6
VMware NSX NSX-T 3.x versions antérieures à 3.0.2
VMware Cloud Foundation VMware Cloud Foundation 3.x versions antérieures à 3.10.1.1
VMware ESXi ESXi 6.7.x versions antérieures à ESXi670-202010401-SG
VMware NSX NSX-T 2.5.x versions antérieures à 2.5.2.2.0
VMware Cloud Foundation VMware Cloud Foundation 4.x versions antérieures à 4.1
VMware ESXi ESXi 6.5.x versions antérieures à ESXi650-202010401-SG
VMware N/A Workstation 15.x toutes versions
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "vCenter 6.7.x versions ant\u00e9rieures \u00e0 6.7 U3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi 7.0.x versions ant\u00e9rieures \u00e0 ESXi_7.0.1-0.0.16850804",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "vCenter 6.5.x versions ant\u00e9rieures \u00e0 6.5 U3K",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion 11.x versions ant\u00e9rieures \u00e0 11.5.6",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "NSX-T 3.x versions ant\u00e9rieures \u00e0 3.0.2",
      "product": {
        "name": "NSX",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation 3.x versions ant\u00e9rieures \u00e0 3.10.1.1",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi 6.7.x versions ant\u00e9rieures \u00e0 ESXi670-202010401-SG",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "NSX-T 2.5.x versions ant\u00e9rieures \u00e0 2.5.2.2.0",
      "product": {
        "name": "NSX",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Cloud Foundation 4.x versions ant\u00e9rieures \u00e0 4.1",
      "product": {
        "name": "Cloud Foundation",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "ESXi 6.5.x versions ant\u00e9rieures \u00e0 ESXi650-202010401-SG",
      "product": {
        "name": "ESXi",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Workstation 15.x toutes versions",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-3981",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3981"
    },
    {
      "name": "CVE-2020-3994",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3994"
    },
    {
      "name": "CVE-2020-3993",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3993"
    },
    {
      "name": "CVE-2020-3995",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3995"
    },
    {
      "name": "CVE-2020-3982",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3982"
    },
    {
      "name": "CVE-2020-3992",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3992"
    }
  ],
  "initial_release_date": "2020-10-20T00:00:00",
  "last_revision_date": "2020-10-20T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-658",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-10-20T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire"
    },
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2020-0023 du 20 octobre 2020",
      "url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
    }
  ]
}

CERTFR-2020-AVI-573
Vulnerability from certfr_avis

De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A VMware Workstation pour Windows version 15.x
VMware N/A VMware client Horizon pour Windows versions antérieures à 5.4.4
VMware Fusion VMware Fusion 11.x
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMware Workstation pour Windows version 15.x",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware client Horizon pour Windows versions ant\u00e9rieures \u00e0 5.4.4",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "VMware Fusion 11.x",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-3980",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3980"
    },
    {
      "name": "CVE-2020-3988",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3988"
    },
    {
      "name": "CVE-2020-3989",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3989"
    },
    {
      "name": "CVE-2020-3986",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3986"
    },
    {
      "name": "CVE-2020-3990",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3990"
    },
    {
      "name": "CVE-2020-3987",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3987"
    }
  ],
  "initial_release_date": "2020-09-15T00:00:00",
  "last_revision_date": "2020-09-15T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-573",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-09-15T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2020-0020 du 14 septembre 2020",
      "url": "https://www.vmware.com/security/advisories/VMSA-2020-0020.html"
    }
  ]
}

CERTFR-2020-AVI-425
Vulnerability from certfr_avis

Une vulnérabilité a été découverte dans les produits VMware. Elle permet à un attaquant de provoquer une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
VMware N/A VMRC pour Mac versions antérieures à 11.2.0 sur OS X
VMware Fusion Fusion versions 11.x antérieures à 11.5.5 sur OS X
VMware N/A Horizon Client pour Mac versions antérieures à 5.4.3 sur OS X
References

Show details on source website


{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "VMRC pour Mac versions ant\u00e9rieures \u00e0 11.2.0 sur OS X",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Fusion versions 11.x ant\u00e9rieures \u00e0 11.5.5 sur OS X",
      "product": {
        "name": "Fusion",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    },
    {
      "description": "Horizon Client pour Mac versions ant\u00e9rieures \u00e0 5.4.3 sur OS X",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "VMware",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-3974",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-3974"
    }
  ],
  "initial_release_date": "2020-07-10T00:00:00",
  "last_revision_date": "2020-07-10T00:00:00",
  "links": [],
  "reference": "CERTFR-2020-AVI-425",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-07-10T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans les produits VMware. Elle permet\n\u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges.\n",
  "title": "Vuln\u00e9rabilit\u00e9 dans les produits VMware",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2020-0017 du 10 juillet 2020",
      "url": "https://www.vmware.com/security/advisories/VMSA-2020-0017.html"
    }
  ]
}