{
  "document" : {
    "aggregate_severity" : {
      "text" : "hoch"
    },
    "category" : "csaf_base",
    "csaf_version" : "2.0",
    "distribution" : {
      "tlp" : {
        "label" : "WHITE",
        "url" : "https://www.first.org/tlp/"
      }
    },
    "lang" : "de-DE",
    "notes" : [ {
      "category" : "legal_disclaimer",
      "text" : "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen."
    }, {
      "category" : "description",
      "text" : "http/2 ist das HyperText Transfer Protocol in Version 2.",
      "title" : "Produktbeschreibung"
    }, {
      "category" : "summary",
      "text" : "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in verschiedenen http/2 Implementierungen ausnutzen, um einen Denial of Service Angriff durchzuführen.",
      "title" : "Angriff"
    }, {
      "category" : "general",
      "text" : "- Linux\n- MacOS X\n- Sonstiges\n- UNIX\n- Windows",
      "title" : "Betroffene Betriebssysteme"
    } ],
    "publisher" : {
      "category" : "other",
      "contact_details" : "csaf-provider@cert-bund.de",
      "name" : "Bundesamt für Sicherheit in der Informationstechnik",
      "namespace" : "https://www.bsi.bund.de"
    },
    "references" : [ {
      "category" : "self",
      "summary" : "WID-SEC-W-2023-2618 - CSAF Version",
      "url" : "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2618.json"
    }, {
      "category" : "self",
      "summary" : "WID-SEC-2023-2618 - Portal Version",
      "url" : "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2618"
    }, {
      "category" : "external",
      "summary" : "Google Blog vom 2023-10-10",
      "url" : "https://cloud.google.com/blog/products/identity-security/how-it-works-the-novel-http2-rapid-reset-ddos-attack"
    }, {
      "category" : "external",
      "summary" : "F5 NGINX Security Advisory K000137106 vom 2023-10-10",
      "url" : "https://my.f5.com/manage/s/article/K000137106"
    }, {
      "category" : "external",
      "summary" : "National Vulnerability Database CVE-2023-44487",
      "url" : "https://nvd.nist.gov/vuln/detail/CVE-2023-44487"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-EPEL-2023-D499E96867 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-d499e96867"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-1CAFFB88AF vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-1caffb88af"
    }, {
      "category" : "external",
      "summary" : "Go Vulnerability Database GO-2023-2102 vom 2023-10-11",
      "url" : "https://pkg.go.dev/vuln/GO-2023-2102"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-EPEL-2023-E2DD7FFA65 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-e2dd7ffa65"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-EPEL-2023-834EF33019 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-834ef33019"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-5FF7BF1DD8 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-5ff7bf1dd8"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-54FADADA12 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-54fadada12"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-B2C50535CB vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-b2c50535cb"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-EPEL-2023-C21E7D6BD5 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-c21e7d6bd5"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-ED2642FD58 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-ed2642fd58"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-3F70B8D406 vom 2023-10-12",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-3f70b8d406"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4069-1 vom 2023-10-13",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016680.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4068-1 vom 2023-10-13",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016681.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5749 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5749"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5738 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5738"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5724 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5724"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5721 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5721.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5721 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5721"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5720 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5720.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5720 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5720"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5719 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5719.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5719 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5719"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5716 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5716.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5716 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5716"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5715 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5715.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5714 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5714.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5714 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5714"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5713 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5713.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5713 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5713"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5712 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5712.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5711 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5711.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5711 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5711"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5710 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5710.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5709 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5709.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5709 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5709"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5708 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5708.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5708 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5708"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5707 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5707.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5706 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5706.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5705 vom 2023-10-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5705.html"
    }, {
      "category" : "external",
      "summary" : "Citrix Security Advisory CTX582159 vom 2023-10-16",
      "url" : "https://support.citrix.com/article/CTX582159/cve202344487-http2-rapid-reset-attack-just-discovered"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DLA-3621 vom 2023-10-16",
      "url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00023.html"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS2-2023-2313 vom 2023-10-17",
      "url" : "https://alas.aws.amazon.com/AL2/ALAS-2023-2313.html"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS2-2023-2312 vom 2023-10-17",
      "url" : "https://alas.aws.amazon.com/AL2/ALAS-2023-2312.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5672 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5672"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5672 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5672.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5766 vom 2023-10-17",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5766"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5767 vom 2023-10-17",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5767"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5770 vom 2023-10-17",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5770"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5768 vom 2023-10-17",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5768"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5769 vom 2023-10-17",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5769"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5803 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5803"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5802 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5802"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5780 vom 2023-10-17",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5780"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5783 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5783"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5801 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5801"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5805 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5805"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5784 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5784"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5809 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5809"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5810 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5810"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALASNGINX1-2023-006 vom 2023-10-18",
      "url" : "https://alas.aws.amazon.com/AL2/ALASNGINX1-2023-006.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5711 vom 2023-10-17",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5711.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5713 vom 2023-10-17",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5713.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5675 vom 2023-10-18",
      "url" : "https://rhn.redhat.com/errata/RHSA-2023:5675.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5710 vom 2023-10-18",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5710.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5708 vom 2023-10-18",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5708.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5677 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5677.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5679 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5679.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5712 vom 2023-10-18",
      "url" : "https://oss.oracle.com/pipermail/el-errata/2023-October/014766.html"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-17EFD3F2CD vom 2023-10-19",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-17efd3f2cd"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5717 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5717"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5837 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5837"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5838 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5838"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5840 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5840"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5863 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5863.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5867 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5867.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5835 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5835"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5851 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5851"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5865 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5865.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5841 vom 2023-10-18",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5841"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5864 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5864.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5866 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5866.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5749 vom 2023-10-18",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5749.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5721 vom 2023-10-19",
      "url" : "http://linux.oracle.com/errata/ELSA-2023-5721.html"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-2A9214AF5F vom 2023-10-19",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-2a9214af5f"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-7934802344 vom 2023-10-19",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-7934802344"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2023-ACBEE8F31A vom 2023-10-18",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2023-acbee8f31a"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5738 vom 2023-10-19",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5738.html"
    }, {
      "category" : "external",
      "summary" : "Jenkins Security Advisory 2023-10-18",
      "url" : "https://www.jenkins.io/security/advisory/2023-10-18/"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5922 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5922.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5946 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5946"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5952 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5952"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5930 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5930"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5951 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5951"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5935 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5935"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5945 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5945"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS-2023-1869 vom 2023-10-19",
      "url" : "https://alas.aws.amazon.com/ALAS-2023-1869.html"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS-2023-1870 vom 2023-10-19",
      "url" : "https://alas.aws.amazon.com/ALAS-2023-1870.html"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALAS-2023-1871 vom 2023-10-19",
      "url" : "https://alas.aws.amazon.com/ALAS-2023-1871.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5838 vom 2023-10-19",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5838.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5920 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5920"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5920 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5920.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5922 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5922"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5924 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5924"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5924 vom 2023-10-19",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5924.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5950 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5950"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5541 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5541.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5530 vom 2023-10-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5530.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6057 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6057"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5989 vom 2023-10-23",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5989"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6020 vom 2023-10-23",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6020"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6020 vom 2023-10-23",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6020.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6023 vom 2023-10-23",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6023"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6030 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6030"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4155-1 vom 2023-10-23",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016810.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6061 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6061"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6057 vom 2023-10-24",
      "url" : "https://rhn.redhat.com/errata/RHSA-2023:6057.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6048 vom 2023-10-24",
      "url" : "https://rhn.redhat.com/errata/RHSA-2023:6048.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6042 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6042"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5867 vom 2023-10-23",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5867.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6031 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6031"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6039 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6039"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6044 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6044"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5863 vom 2023-10-23",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-5863.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6040 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6040"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6041 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6041"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6048 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6048"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6059 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6059"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5902 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5902"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5989 vom 2023-10-25",
      "url" : "http://linux.oracle.com/errata/ELSA-2023-5989.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4163-1 vom 2023-10-24",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016824.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6085 vom 2023-10-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6085"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6084 vom 2023-10-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6084"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6080 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6080"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6079 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6079"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6077 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6077"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6071 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6071"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5895 vom 2023-10-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5895"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5542 vom 2023-10-24",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5542"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-5924 vom 2023-10-25",
      "url" : "http://linux.oracle.com/errata/ELSA-2023-5924.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6116 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6116"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6117 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6117"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6118 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6118"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6119 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6119"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6120 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6120"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5896 vom 2023-10-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5896"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6121 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6121"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6122 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6122"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6114 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6114"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6115 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6115"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4200-1 vom 2023-10-26",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016846.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4199-1 vom 2023-10-26",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016847.html"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin vom 2023-10-26",
      "url" : "https://www.ibm.com/support/pages/node/7060461"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5933 vom 2023-10-27",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5933"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5947 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5947"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6105 vom 2023-10-27",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6105"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6106 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6106"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6137 vom 2023-10-26",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6137"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4210-1 vom 2023-10-26",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-October/016857.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6148 vom 2023-10-27",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6148"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-EPEL-2023-B951076A0F vom 2023-10-27",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2023-b951076a0f"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6022 vom 2023-10-27",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6022"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6021 vom 2023-10-27",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6021"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6144 vom 2023-10-30",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6144"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6156 vom 2023-10-30",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6156"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6161 vom 2023-10-30",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6161"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6129 vom 2023-10-30",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6129"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6200 vom 2023-10-31",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6200"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6130 vom 2023-10-31",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6130"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6202 vom 2023-10-31",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6202"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6165 vom 2023-10-30",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6165"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6143 vom 2023-10-31",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6143"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5005 vom 2023-10-31",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5005"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5007 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5007"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5006 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6217"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:5009 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:5009"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6220 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6220"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6154 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6154"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DLA-3638 vom 2023-10-31",
      "url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00047.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6251 vom 2023-11-02",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6251"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6239 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6239"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6233 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6233"
    }, {
      "category" : "external",
      "summary" : "Amazon Linux Security Advisory ALASECS-2023-016 vom 2023-11-01",
      "url" : "https://alas.aws.amazon.com/AL2/ALASECS-2023-016.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6240 vom 2023-11-02",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6240"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6235 vom 2023-11-01",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6235"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6248 vom 2023-11-02",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6248"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6243 vom 2023-11-02",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6243"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DSA-5549 vom 2023-11-05",
      "url" : "https://lists.debian.org/debian-security-announce/2023/msg00245.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6298 vom 2023-11-03",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6298"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DLA-3645 vom 2023-11-05",
      "url" : "https://lists.debian.org/debian-lts-announce/2023/11/msg00001.html"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DSA-5549 vom 2023-11-06",
      "url" : "https://www.debian.org/security/2023/dsa-5549"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6305 vom 2023-11-06",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6305"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6779 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6779"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6782 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6782"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6781 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6781"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6746 vom 2023-11-07",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6746"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6783 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6783"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6786 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6786"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6787 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6787"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6788 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6788"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6784 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6784"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6828 vom 2023-11-09",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6828"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6817 vom 2023-11-09",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6817"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6272 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6272"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6271 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6271"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6257 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6257"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6256 vom 2023-11-08",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6256"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6832 vom 2023-11-09",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6832"
    }, {
      "category" : "external",
      "summary" : "Varnish Security Advisory VSV00013 vom 2023-11-13",
      "url" : "https://varnish-cache.org/security/VSV00013.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7216 vom 2023-11-15",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7216"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7205 vom 2023-11-15",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7205"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7215 vom 2023-11-15",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7215"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7077069 vom 2023-11-16",
      "url" : "https://www.ibm.com/support/pages/node/7077069"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6269 vom 2023-11-15",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6269"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6845 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6845"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7247 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7247"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6279 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6279"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6836 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6836"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6837 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6840"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7218 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7218"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:6846 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:6846"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7076252 vom 2023-11-15",
      "url" : "https://www.ibm.com/support/pages/node/7076252"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4469-1 vom 2023-11-16",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017050.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7335 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7335"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7334 vom 2023-11-16",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7334"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-6746 vom 2023-11-16",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-6746.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4472-1 vom 2023-11-16",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017047.html"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DSA-5558 vom 2023-11-18",
      "url" : "https://www.debian.org/security/2023/dsa-5558"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7345 vom 2023-11-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7345"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7344 vom 2023-11-20",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7344"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4492-1 vom 2023-11-20",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017128.html"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6505-1 vom 2023-11-22",
      "url" : "https://ubuntu.com/security/notices/USN-6505-1"
    }, {
      "category" : "external",
      "summary" : "Gentoo Linux Security Advisory GLSA-202311-09 vom 2023-11-25",
      "url" : "https://security.gentoo.org/glsa/202311-09"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7482 vom 2023-11-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7482"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7483 vom 2023-11-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7483"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7484 vom 2023-11-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7484"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7486 vom 2023-11-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7486"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7488 vom 2023-11-25",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7488"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7515 vom 2023-11-27",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7515"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7475 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7475"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7555 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7555"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7474 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7474"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7478 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7478"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7479 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7479"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7479 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7481"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7522 vom 2023-11-28",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7522"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7521 vom 2023-11-28",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7521"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7469 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7469"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4613-1 vom 2023-11-29",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017259.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7470 vom 2023-11-29",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7470"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7587 vom 2023-11-30",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7587"
    }, {
      "category" : "external",
      "summary" : "Debian Security Advisory DSA-5570 vom 2023-12-01",
      "url" : "https://lists.debian.org/debian-security-announce/2023/msg00266.html"
    }, {
      "category" : "external",
      "summary" : "VERITAS Security Advisory VTS23-014 vom 2023-12-04",
      "url" : "https://www.veritas.com/support/en_US/security/VTS23-014"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7638 vom 2023-12-05",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7638"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7637 vom 2023-12-05",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7637"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7641 vom 2023-12-05",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7641"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7639 vom 2023-12-05",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7639"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7599 vom 2023-12-05",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7599"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7662 vom 2023-12-06",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7662"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7653 vom 2023-12-06",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7653"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7610 vom 2023-12-07",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7610"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7607 vom 2023-12-07",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7607"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7608 vom 2023-12-07",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7608"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7710 vom 2023-12-11",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7710"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-13028 vom 2023-12-08",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-13028.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-13029 vom 2023-12-08",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-13029.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7682 vom 2023-12-12",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7682"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7741 vom 2023-12-12",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7741"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7687 vom 2023-12-13",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7687"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7099297 vom 2023-12-18",
      "url" : "https://www.ibm.com/support/pages/node/7099297"
    }, {
      "category" : "external",
      "summary" : "Cisco Security Advisory",
      "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http2-reset-d8Kf32vZ"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-13053 vom 2023-12-22",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-13053.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2023-13054 vom 2023-12-22",
      "url" : "https://linux.oracle.com/errata/ELSA-2023-13054.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7831 vom 2024-01-04",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7831"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7105533 vom 2024-01-06",
      "url" : "https://www.ibm.com/support/pages/node/7105533"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6574-1 vom 2024-01-11",
      "url" : "https://ubuntu.com/security/notices/USN-6574-1"
    }, {
      "category" : "external",
      "summary" : "PDFreactor 11.6.10 Release History vom 2024-01-11",
      "url" : "https://www.pdfreactor.com/product/changelog.htm"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0304 vom 2024-01-19",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0304"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0193 vom 2024-01-20",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0193"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0273 vom 2024-01-20",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0273"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0198 vom 2024-01-20",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0198"
    }, {
      "category" : "external",
      "summary" : "IBM Security Advisory",
      "url" : "https://www.ibm.com/support/pages/node/7109966"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0306 vom 2024-01-25",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0306"
    }, {
      "category" : "external",
      "summary" : "DELL Security Update",
      "url" : "https://www.dell.com/support/kbdoc/de-de/000221476/dsa-2024-058-security-update-for-dell-networker-vproxy-multiple-components-vulnerabilities"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0485 vom 2024-01-31",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0485"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0660 vom 2024-02-07",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0660"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0642 vom 2024-02-07",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0642"
    }, {
      "category" : "external",
      "summary" : "FortiGuard Labs PSIRT Advisory FG-IR-23-397 vom 2024-02-08",
      "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-23-397"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0777 vom 2024-02-12",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0777"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0741 vom 2024-02-14",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0741"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7118289 vom 2024-02-15",
      "url" : "https://www.ibm.com/support/pages/node/7118289"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0837 vom 2024-02-20",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0837"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0941 vom 2024-02-28",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0941"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2023:4624-1 vom 2024-02-27",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-February/018051.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0954 vom 2024-02-28",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0954"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0269 vom 2024-02-28",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0269"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7201 vom 2024-02-28",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7201"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7200 vom 2024-02-28",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7200"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2023:7198 vom 2024-02-28",
      "url" : "https://access.redhat.com/errata/RHSA-2023:7198"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7129250 vom 2024-03-01",
      "url" : "https://www.ibm.com/support/pages/node/7129250"
    }, {
      "category" : "external",
      "summary" : "XEROX Security Advisory XRX24-005 vom 2024-03-04",
      "url" : "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:0302 vom 2024-03-06",
      "url" : "https://access.redhat.com/errata/RHSA-2024:0302"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:1037 vom 2024-03-06",
      "url" : "https://access.redhat.com/errata/RHSA-2024:1037"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7117224 vom 2024-03-20",
      "url" : "https://www.ibm.com/support/pages/node/7117224"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2024-12226 vom 2024-03-20",
      "url" : "https://linux.oracle.com/errata/ELSA-2024-12226.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:1454 vom 2024-03-27",
      "url" : "https://access.redhat.com/errata/RHSA-2024:1454"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:1458 vom 2024-03-27",
      "url" : "https://access.redhat.com/errata/RHSA-2024:1458"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:1449 vom 2024-03-27",
      "url" : "https://access.redhat.com/errata/RHSA-2024:1449"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:1464 vom 2024-03-27",
      "url" : "https://access.redhat.com/errata/RHSA-2024:1464"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7147550 vom 2024-04-05",
      "url" : "https://www.ibm.com/support/pages/node/7147550"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7147788 vom 2024-04-09",
      "url" : "https://www.ibm.com/support/pages/node/7147788"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2024-CC8FCAB025 vom 2024-04-16",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2024-cc8fcab025"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:1770 vom 2024-04-16",
      "url" : "https://access.redhat.com/errata/RHSA-2024:1770"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7148393 vom 2024-04-16",
      "url" : "https://www.ibm.com/support/pages/node/7148393"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin",
      "url" : "https://www.ibm.com/support/pages/node/7149178"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6754-1 vom 2024-04-26",
      "url" : "https://ubuntu.com/security/notices/USN-6754-1"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:2368 vom 2024-04-30",
      "url" : "https://access.redhat.com/errata/RHSA-2024:2368"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:2633 vom 2024-05-01",
      "url" : "https://access.redhat.com/errata/RHSA-2024:2633"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-6754-2 vom 2024-05-07",
      "url" : "https://ubuntu.com/security/notices/USN-6754-2"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:3121 vom 2024-05-22",
      "url" : "https://access.redhat.com/errata/RHSA-2024:3121"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:3927 vom 2024-06-14",
      "url" : "https://access.redhat.com/errata/RHSA-2024:3927"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7156535 vom 2024-06-19",
      "url" : "https://www.ibm.com/support/pages/node/7156535"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:4118 vom 2024-06-26",
      "url" : "https://access.redhat.com/errata/RHSA-2024:4118"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7159714 vom 2024-07-05",
      "url" : "https://www.ibm.com/support/pages/node/7159714"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
      "url" : "https://access.redhat.com/errata/RHSA-2024:4631"
    }, {
      "category" : "external",
      "summary" : "Gentoo Linux Security Advisory GLSA-202408-10 vom 2024-08-07",
      "url" : "https://security.gentoo.org/glsa/202408-10"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:3097-1 vom 2024-09-03",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019364.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:3098-1 vom 2024-09-03",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019363.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:3094-1 vom 2024-09-03",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019366.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:6536 vom 2024-09-10",
      "url" : "https://access.redhat.com/errata/RHSA-2024:6536"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7168799 vom 2024-09-18",
      "url" : "https://www.ibm.com/support/pages/node/7168799"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:3344-1 vom 2024-09-19",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019471.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:3343-1 vom 2024-09-19",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019472.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:3341-1 vom 2024-09-19",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019474.html"
    }, {
      "category" : "external",
      "summary" : "SUSE Security Update SUSE-SU-2024:3342-1 vom 2024-09-19",
      "url" : "https://lists.suse.com/pipermail/sle-security-updates/2024-September/019473.html"
    }, {
      "category" : "external",
      "summary" : "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14",
      "url" : "https://advisory.splunk.com//advisories/SVD-2024-1012"
    }, {
      "category" : "external",
      "summary" : "Ubuntu Security Notice USN-7067-1 vom 2024-10-14",
      "url" : "https://ubuntu.com/security/notices/USN-7067-1"
    }, {
      "category" : "external",
      "summary" : "Moxa Security Advisory MPSA-241044 vom 2024-11-04",
      "url" : "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-241044-vulnerabilities-identified-in-mds-g4028-l3-series-and-eds-g512e"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:10142 vom 2024-11-26",
      "url" : "https://access.redhat.com/errata/RHSA-2024:10142"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:10523 vom 2024-12-04",
      "url" : "https://access.redhat.com/errata/RHSA-2024:10523"
    }, {
      "category" : "external",
      "summary" : "Gentoo Linux Security Advisory GLSA-202412-14 vom 2024-12-08",
      "url" : "https://security.gentoo.org/glsa/202412-14"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2024:10813 vom 2024-12-12",
      "url" : "https://access.redhat.com/errata/RHSA-2024:10813"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7179370 vom 2024-12-18",
      "url" : "https://www.ibm.com/support/pages/node/7179370"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2025:0014 vom 2025-01-09",
      "url" : "https://access.redhat.com/errata/RHSA-2025:0014"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2025:1116 vom 2025-02-13",
      "url" : "https://access.redhat.com/errata/RHSA-2025:1116"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2025-3262 vom 2025-03-28",
      "url" : "https://linux.oracle.com/errata/ELSA-2025-3262.html"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2025-3261 vom 2025-03-28",
      "url" : "https://linux.oracle.com/errata/ELSA-2025-3261.html"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7229443 vom 2025-03-28",
      "url" : "https://www.ibm.com/support/pages/node/7229443"
    }, {
      "category" : "external",
      "summary" : "Google Cloud Platform Security Bulletin GCP-2025-023 vom 2025-05-05",
      "url" : "https://cloud.google.com/support/bulletins#gcp-2025-023"
    }, {
      "category" : "external",
      "summary" : "Siemens Security Advisory SSA-082556 vom 2025-06-10",
      "url" : "https://cert-portal.siemens.com/productcert/html/ssa-082556.html"
    }, {
      "category" : "external",
      "summary" : "IBM Security Bulletin 7239753 vom 2025-07-15",
      "url" : "https://www.ibm.com/support/pages/node/7239753"
    }, {
      "category" : "external",
      "summary" : "openSUSE Security Update OPENSUSE-SU-2025:0179-1 vom 2025-07-27",
      "url" : "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/II5B2CT5HZABT3DJYMWEV6U6IDZLMPPH/"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2025:16668 vom 2025-09-25",
      "url" : "https://access.redhat.com/errata/RHSA-2025:16668"
    }, {
      "category" : "external",
      "summary" : "Dell Security Update vom 2025-10-02",
      "url" : "https://www.dell.com/support/kbdoc/000376224"
    }, {
      "category" : "external",
      "summary" : "Fedora Security Advisory FEDORA-2025-2FF6E32273 vom 2025-10-30",
      "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2025-2ff6e32273"
    }, {
      "category" : "external",
      "summary" : "Rocky Linux Security Advisory RLSA-2023:5837 vom 2025-12-05",
      "url" : "https://errata.build.resf.org/RLSA-2023:5837"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2025-23732 vom 2025-12-26",
      "url" : "http://linux.oracle.com/errata/ELSA-2025-23732.html"
    }, {
      "category" : "external",
      "summary" : "Red Hat Security Advisory RHSA-2026:0722 vom 2026-01-15",
      "url" : "https://access.redhat.com/errata/RHSA-2026:0722"
    }, {
      "category" : "external",
      "summary" : "Oracle Linux Security Advisory ELSA-2026-5581 vom 2026-03-25",
      "url" : "https://linux.oracle.com/errata/ELSA-2026-5581.html"
    } ],
    "source_lang" : "en-US",
    "title" : "http/2 Implementierungen: Schwachstelle ermöglicht Denial of Service",
    "tracking" : {
      "current_release_date" : "2026-03-24T23:00:00.000+00:00",
      "generator" : {
        "date" : "2026-03-25T10:21:25.362+00:00",
        "engine" : {
          "name" : "BSI-WID",
          "version" : "1.5.0"
        }
      },
      "id" : "WID-SEC-W-2023-2618",
      "initial_release_date" : "2023-10-10T22:00:00.000+00:00",
      "revision_history" : [ {
        "date" : "2023-10-10T22:00:00.000+00:00",
        "number" : "1",
        "summary" : "Initiale Fassung"
      }, {
        "date" : "2023-10-11T22:00:00.000+00:00",
        "number" : "2",
        "summary" : "Neue Updates von Red Hat, Fedora und Go aufgenommen"
      }, {
        "date" : "2023-10-12T22:00:00.000+00:00",
        "number" : "3",
        "summary" : "Neue Updates von Fedora aufgenommen"
      }, {
        "date" : "2023-10-15T22:00:00.000+00:00",
        "number" : "4",
        "summary" : "Neue Updates von SUSE aufgenommen"
      }, {
        "date" : "2023-10-16T22:00:00.000+00:00",
        "number" : "5",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-10-17T22:00:00.000+00:00",
        "number" : "6",
        "summary" : "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen"
      }, {
        "date" : "2023-10-18T22:00:00.000+00:00",
        "number" : "7",
        "summary" : "Neue Updates von Fedora, Red Hat und Oracle Linux aufgenommen"
      }, {
        "date" : "2023-10-19T22:00:00.000+00:00",
        "number" : "8",
        "summary" : "Neue Updates von Red Hat, Amazon und Oracle Linux aufgenommen"
      }, {
        "date" : "2023-10-23T22:00:00.000+00:00",
        "number" : "9",
        "summary" : "Neue Updates von Red Hat, SUSE und Oracle Linux aufgenommen"
      }, {
        "date" : "2023-10-24T22:00:00.000+00:00",
        "number" : "10",
        "summary" : "Neue Updates von Oracle Linux, SUSE und Red Hat aufgenommen"
      }, {
        "date" : "2023-10-25T22:00:00.000+00:00",
        "number" : "11",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-10-26T22:00:00.000+00:00",
        "number" : "12",
        "summary" : "Neue Updates von IBM, Red Hat und SUSE aufgenommen"
      }, {
        "date" : "2023-10-29T23:00:00.000+00:00",
        "number" : "13",
        "summary" : "Neue Updates von Fedora und Red Hat aufgenommen"
      }, {
        "date" : "2023-10-30T23:00:00.000+00:00",
        "number" : "14",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-10-31T23:00:00.000+00:00",
        "number" : "15",
        "summary" : "Neue Updates von Red Hat und Debian aufgenommen"
      }, {
        "date" : "2023-11-01T23:00:00.000+00:00",
        "number" : "16",
        "summary" : "Neue Updates von Red Hat und Amazon aufgenommen"
      }, {
        "date" : "2023-11-05T23:00:00.000+00:00",
        "number" : "17",
        "summary" : "Neue Updates von Debian und Red Hat aufgenommen"
      }, {
        "date" : "2023-11-06T23:00:00.000+00:00",
        "number" : "18",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-11-07T23:00:00.000+00:00",
        "number" : "19",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-11-08T23:00:00.000+00:00",
        "number" : "20",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-11-13T23:00:00.000+00:00",
        "number" : "21",
        "summary" : "Neue Updates von Varnish Software aufgenommen"
      }, {
        "date" : "2023-11-14T23:00:00.000+00:00",
        "number" : "22",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-11-15T23:00:00.000+00:00",
        "number" : "23",
        "summary" : "Neue Updates von IBM und Red Hat aufgenommen"
      }, {
        "date" : "2023-11-16T23:00:00.000+00:00",
        "number" : "24",
        "summary" : "Neue Updates von SUSE, Red Hat und Oracle Linux aufgenommen"
      }, {
        "date" : "2023-11-19T23:00:00.000+00:00",
        "number" : "25",
        "summary" : "Neue Updates von Debian aufgenommen"
      }, {
        "date" : "2023-11-20T23:00:00.000+00:00",
        "number" : "26",
        "summary" : "Neue Updates von Red Hat und SUSE aufgenommen"
      }, {
        "date" : "2023-11-22T23:00:00.000+00:00",
        "number" : "27",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2023-11-26T23:00:00.000+00:00",
        "number" : "28",
        "summary" : "Neue Updates von Gentoo und Red Hat aufgenommen"
      }, {
        "date" : "2023-11-27T23:00:00.000+00:00",
        "number" : "29",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-11-28T23:00:00.000+00:00",
        "number" : "30",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-11-29T23:00:00.000+00:00",
        "number" : "31",
        "summary" : "Neue Updates von Red Hat und SUSE aufgenommen"
      }, {
        "date" : "2023-12-03T23:00:00.000+00:00",
        "number" : "32",
        "summary" : "Neue Updates von Debian und VERITAS aufgenommen"
      }, {
        "date" : "2023-12-04T23:00:00.000+00:00",
        "number" : "33",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-12-05T23:00:00.000+00:00",
        "number" : "34",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-12-06T23:00:00.000+00:00",
        "number" : "35",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-12-10T23:00:00.000+00:00",
        "number" : "36",
        "summary" : "Neue Updates von Red Hat und Oracle Linux aufgenommen"
      }, {
        "date" : "2023-12-12T23:00:00.000+00:00",
        "number" : "37",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2023-12-18T23:00:00.000+00:00",
        "number" : "38",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2023-12-21T23:00:00.000+00:00",
        "number" : "39",
        "summary" : "Neue Updates von Cisco und Oracle Linux aufgenommen"
      }, {
        "date" : "2024-01-03T23:00:00.000+00:00",
        "number" : "40",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-01-07T23:00:00.000+00:00",
        "number" : "41",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-01-10T23:00:00.000+00:00",
        "number" : "42",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-01-11T23:00:00.000+00:00",
        "number" : "43",
        "summary" : "Neue Updates aufgenommen"
      }, {
        "date" : "2024-01-18T23:00:00.000+00:00",
        "number" : "44",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-01-21T23:00:00.000+00:00",
        "number" : "45",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-01-22T23:00:00.000+00:00",
        "number" : "46",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-01-24T23:00:00.000+00:00",
        "number" : "47",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-01-28T23:00:00.000+00:00",
        "number" : "48",
        "summary" : "Neue Updates von Dell aufgenommen"
      }, {
        "date" : "2024-01-31T23:00:00.000+00:00",
        "number" : "49",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-02-07T23:00:00.000+00:00",
        "number" : "50",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-02-08T23:00:00.000+00:00",
        "number" : "51",
        "summary" : "Neue Updates von Fortinet aufgenommen"
      }, {
        "date" : "2024-02-11T23:00:00.000+00:00",
        "number" : "52",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-02-13T23:00:00.000+00:00",
        "number" : "53",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-02-14T23:00:00.000+00:00",
        "number" : "54",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-02-20T23:00:00.000+00:00",
        "number" : "55",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-02-27T23:00:00.000+00:00",
        "number" : "56",
        "summary" : "Neue Updates von Red Hat und SUSE aufgenommen"
      }, {
        "date" : "2024-03-03T23:00:00.000+00:00",
        "number" : "57",
        "summary" : "Neue Updates von IBM und XEROX aufgenommen"
      }, {
        "date" : "2024-03-06T23:00:00.000+00:00",
        "number" : "58",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-03-19T23:00:00.000+00:00",
        "number" : "59",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-03-20T23:00:00.000+00:00",
        "number" : "60",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      }, {
        "date" : "2024-03-26T23:00:00.000+00:00",
        "number" : "61",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-03-27T23:00:00.000+00:00",
        "number" : "62",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-04-07T22:00:00.000+00:00",
        "number" : "63",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-04-09T22:00:00.000+00:00",
        "number" : "64",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-04-16T22:00:00.000+00:00",
        "number" : "65",
        "summary" : "Neue Updates von Fedora, Red Hat und IBM aufgenommen"
      }, {
        "date" : "2024-04-23T22:00:00.000+00:00",
        "number" : "66",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-04-25T22:00:00.000+00:00",
        "number" : "67",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-04-29T22:00:00.000+00:00",
        "number" : "68",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-05-01T22:00:00.000+00:00",
        "number" : "69",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-05-07T22:00:00.000+00:00",
        "number" : "70",
        "summary" : "Neue Updates von Ubuntu aufgenommen"
      }, {
        "date" : "2024-05-21T22:00:00.000+00:00",
        "number" : "71",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-06-13T22:00:00.000+00:00",
        "number" : "72",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-06-19T22:00:00.000+00:00",
        "number" : "73",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-06-25T22:00:00.000+00:00",
        "number" : "74",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-07-07T22:00:00.000+00:00",
        "number" : "75",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-07-18T22:00:00.000+00:00",
        "number" : "76",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-08-07T22:00:00.000+00:00",
        "number" : "77",
        "summary" : "Neue Updates von Gentoo aufgenommen"
      }, {
        "date" : "2024-09-03T22:00:00.000+00:00",
        "number" : "78",
        "summary" : "Neue Updates von SUSE aufgenommen"
      }, {
        "date" : "2024-09-10T22:00:00.000+00:00",
        "number" : "79",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-09-17T22:00:00.000+00:00",
        "number" : "80",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2024-09-19T22:00:00.000+00:00",
        "number" : "81",
        "summary" : "Neue Updates von SUSE aufgenommen"
      }, {
        "date" : "2024-10-14T22:00:00.000+00:00",
        "number" : "82",
        "summary" : "Neue Updates von Splunk-SVD aufgenommen"
      }, {
        "date" : "2024-11-03T23:00:00.000+00:00",
        "number" : "83",
        "summary" : "Neue Updates von moxa aufgenommen"
      }, {
        "date" : "2024-11-25T23:00:00.000+00:00",
        "number" : "84",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-12-04T23:00:00.000+00:00",
        "number" : "85",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-12-08T23:00:00.000+00:00",
        "number" : "86",
        "summary" : "Neue Updates von Gentoo aufgenommen"
      }, {
        "date" : "2024-12-11T23:00:00.000+00:00",
        "number" : "87",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2024-12-18T23:00:00.000+00:00",
        "number" : "88",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2025-01-08T23:00:00.000+00:00",
        "number" : "89",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2025-02-12T23:00:00.000+00:00",
        "number" : "90",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2025-03-27T23:00:00.000+00:00",
        "number" : "91",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      }, {
        "date" : "2025-03-30T22:00:00.000+00:00",
        "number" : "92",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2025-05-05T22:00:00.000+00:00",
        "number" : "93",
        "summary" : "Neue Updates von Google aufgenommen"
      }, {
        "date" : "2025-06-10T22:00:00.000+00:00",
        "number" : "94",
        "summary" : "Neue Updates von Siemens aufgenommen"
      }, {
        "date" : "2025-07-15T22:00:00.000+00:00",
        "number" : "95",
        "summary" : "Neue Updates von IBM aufgenommen"
      }, {
        "date" : "2025-07-27T22:00:00.000+00:00",
        "number" : "96",
        "summary" : "Neue Updates von openSUSE aufgenommen"
      }, {
        "date" : "2025-09-24T22:00:00.000+00:00",
        "number" : "97",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2025-10-01T22:00:00.000+00:00",
        "number" : "98",
        "summary" : "Neue Updates von Dell aufgenommen"
      }, {
        "date" : "2025-10-29T23:00:00.000+00:00",
        "number" : "99",
        "summary" : "Neue Updates von Fedora aufgenommen"
      }, {
        "date" : "2025-12-04T23:00:00.000+00:00",
        "number" : "100",
        "summary" : "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
      }, {
        "date" : "2025-12-28T23:00:00.000+00:00",
        "number" : "101",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      }, {
        "date" : "2026-01-15T23:00:00.000+00:00",
        "number" : "102",
        "summary" : "Neue Updates von Red Hat aufgenommen"
      }, {
        "date" : "2026-03-24T23:00:00.000+00:00",
        "number" : "103",
        "summary" : "Neue Updates von Oracle Linux aufgenommen"
      } ],
      "status" : "final",
      "version" : "103"
    }
  },
  "product_tree" : {
    "branches" : [ {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Amazon Linux 2",
        "product" : {
          "name" : "Amazon Linux 2",
          "product_id" : "398363",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:amazon:linux_2:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Amazon"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<X14.3.3",
          "product" : {
            "name" : "Cisco Expressway <X14.3.3",
            "product_id" : "T031800"
          }
        }, {
          "category" : "product_version",
          "name" : "X14.3.3",
          "product" : {
            "name" : "Cisco Expressway X14.3.3",
            "product_id" : "T031800-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cisco:expressway_software:x14.3.3"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Expressway"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<7.4.2",
          "product" : {
            "name" : "Cisco Firepower <7.4.2",
            "product_id" : "T031793"
          }
        }, {
          "category" : "product_version",
          "name" : "7.4.2",
          "product" : {
            "name" : "Cisco Firepower 7.4.2",
            "product_id" : "T031793-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cisco:firepower:7.4.2"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Firepower"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<17.15.1",
          "product" : {
            "name" : "Cisco IOS XE <17.15.1",
            "product_id" : "T031794"
          }
        }, {
          "category" : "product_version",
          "name" : "17.15.1",
          "product" : {
            "name" : "Cisco IOS XE 17.15.1",
            "product_id" : "T031794-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:cisco:ios_xe:17.15.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "IOS XE"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<7.11.2",
          "product" : {
            "name" : "Cisco IOS XR <7.11.2",
            "product_id" : "T031795"
          }
        }, {
          "category" : "product_version",
          "name" : "7.11.2",
          "product" : {
            "name" : "Cisco IOS XR 7.11.2",
            "product_id" : "T031795-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:cisco:ios_xr:7.11.2"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<24.1.1",
          "product" : {
            "name" : "Cisco IOS XR <24.1.1",
            "product_id" : "T031796"
          }
        }, {
          "category" : "product_version",
          "name" : "24.1.1",
          "product" : {
            "name" : "Cisco IOS XR 24.1.1",
            "product_id" : "T031796-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:cisco:ios_xr:24.1.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "IOS XR"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "3000 Series Switches",
          "product" : {
            "name" : "Cisco Nexus 3000 Series Switches",
            "product_id" : "T029478",
            "product_identification_helper" : {
              "cpe" : "cpe:/h:cisco:nexus:3000_series_switches"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "9000 Series Switches",
          "product" : {
            "name" : "Cisco Nexus 9000 Series Switches",
            "product_id" : "T031797",
            "product_identification_helper" : {
              "cpe" : "cpe:/h:cisco:nexus:9000_series_switches"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Nexus"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<3.10.4",
          "product" : {
            "name" : "Cisco Prime Infrastructure <3.10.4",
            "product_id" : "T031791"
          }
        }, {
          "category" : "product_version",
          "name" : "3.10.4",
          "product" : {
            "name" : "Cisco Prime Infrastructure 3.10.4",
            "product_id" : "T031791-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cisco:prime_infrastructure:3.10.4"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Prime Infrastructure"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<11.2",
          "product" : {
            "name" : "Cisco Prime Network Registrar <11.2",
            "product_id" : "T031790"
          }
        }, {
          "category" : "product_version",
          "name" : "11.2",
          "product" : {
            "name" : "Cisco Prime Network Registrar 11.2",
            "product_id" : "T031790-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cisco:prime_network_registrar:11.2"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Prime Network Registrar"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<15.2.0",
          "product" : {
            "name" : "Cisco Secure Web Appliance <15.2.0",
            "product_id" : "T031792"
          }
        }, {
          "category" : "product_version",
          "name" : "15.2.0",
          "product" : {
            "name" : "Cisco Secure Web Appliance 15.2.0",
            "product_id" : "T031792-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/h:cisco:secure_web_appliance:15.2.0"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Secure Web Appliance"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<X14.3.3",
          "product" : {
            "name" : "Cisco TelePresence <X14.3.3",
            "product_id" : "T031801"
          }
        }, {
          "category" : "product_version",
          "name" : "X14.3.3",
          "product" : {
            "name" : "Cisco TelePresence X14.3.3",
            "product_id" : "T031801-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/h:cisco:telepresence:x14.3.3"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "TelePresence"
      }, {
        "category" : "product_name",
        "name" : "Cisco Unified Attendant Console Advanced",
        "product" : {
          "name" : "Cisco Unified Attendant Console Advanced",
          "product_id" : "T031798",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:cisco:unified_attendant_console_advanced:-"
          }
        }
      }, {
        "branches" : [ {
          "category" : "product_name",
          "name" : "Cisco Unified Contact Center Enterprise",
          "product" : {
            "name" : "Cisco Unified Contact Center Enterprise",
            "product_id" : "2143",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cisco:unified_contact_center_enterprise:-"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<12.6.2",
          "product" : {
            "name" : "Cisco Unified Contact Center Enterprise <12.6.2",
            "product_id" : "T031799"
          }
        }, {
          "category" : "product_version",
          "name" : "12.6.2",
          "product" : {
            "name" : "Cisco Unified Contact Center Enterprise 12.6.2",
            "product_id" : "T031799-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cisco:unified_contact_center_enterprise:12.6.2"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Unified Contact Center Enterprise"
      } ],
      "category" : "vendor",
      "name" : "Cisco"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Citrix Systems ADC",
        "product" : {
          "name" : "Citrix Systems ADC",
          "product_id" : "T019841",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:citrix:application_delivery_controller_firmware:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "Citrix Systems Citrix Gateway",
        "product" : {
          "name" : "Citrix Systems Citrix Gateway",
          "product_id" : "616020",
          "product_identification_helper" : {
            "cpe" : "cpe:/h:citrix:gateway:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Citrix Systems"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Debian Linux",
        "product" : {
          "name" : "Debian Linux",
          "product_id" : "2951",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:debian:debian_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Debian"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "vProxy<19.9.0.4",
          "product" : {
            "name" : "Dell NetWorker vProxy<19.9.0.4",
            "product_id" : "T032377"
          }
        }, {
          "category" : "product_version",
          "name" : "vProxy19.9.0.4",
          "product" : {
            "name" : "Dell NetWorker vProxy19.9.0.4",
            "product_id" : "T032377-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:dell:networker:vproxy_19.9.0.4"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "vProxy<19.10",
          "product" : {
            "name" : "Dell NetWorker vProxy<19.10",
            "product_id" : "T032378"
          }
        }, {
          "category" : "product_version",
          "name" : "vProxy19.10",
          "product" : {
            "name" : "Dell NetWorker vProxy19.10",
            "product_id" : "T032378-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:dell:networker:vproxy_19.10"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "NetWorker"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<8.4.0.0",
          "product" : {
            "name" : "Dell PowerProtect Data Domain <8.4.0.0",
            "product_id" : "T045879"
          }
        }, {
          "category" : "product_version",
          "name" : "8.4.0.0",
          "product" : {
            "name" : "Dell PowerProtect Data Domain 8.4.0.0",
            "product_id" : "T045879-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<7.10.1.70",
          "product" : {
            "name" : "Dell PowerProtect Data Domain <7.10.1.70",
            "product_id" : "T045881"
          }
        }, {
          "category" : "product_version",
          "name" : "7.10.1.70",
          "product" : {
            "name" : "Dell PowerProtect Data Domain 7.10.1.70",
            "product_id" : "T045881-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<7.13.1.40",
          "product" : {
            "name" : "Dell PowerProtect Data Domain <7.13.1.40",
            "product_id" : "T047343"
          }
        }, {
          "category" : "product_version",
          "name" : "7.13.1.40",
          "product" : {
            "name" : "Dell PowerProtect Data Domain 7.13.1.40",
            "product_id" : "T047343-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<8.3.1.10",
          "product" : {
            "name" : "Dell PowerProtect Data Domain <8.3.1.10",
            "product_id" : "T047344"
          }
        }, {
          "category" : "product_version",
          "name" : "8.3.1.10",
          "product" : {
            "name" : "Dell PowerProtect Data Domain 8.3.1.10",
            "product_id" : "T047344-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "PowerProtect Data Domain"
      } ],
      "category" : "vendor",
      "name" : "Dell"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Fedora Linux",
        "product" : {
          "name" : "Fedora Linux",
          "product_id" : "74185",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:fedoraproject:fedora:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Fedora"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<7.4.2",
          "product" : {
            "name" : "Fortinet FortiOS <7.4.2",
            "product_id" : "T031933"
          }
        }, {
          "category" : "product_version",
          "name" : "7.4.2",
          "product" : {
            "name" : "Fortinet FortiOS 7.4.2",
            "product_id" : "T031933-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:fortinet:fortios:7.4.2"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<7.2.7",
          "product" : {
            "name" : "Fortinet FortiOS <7.2.7",
            "product_id" : "T032608"
          }
        }, {
          "category" : "product_version",
          "name" : "7.2.7",
          "product" : {
            "name" : "Fortinet FortiOS 7.2.7",
            "product_id" : "T032608-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:fortinet:fortios:7.2.7"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<7.0.14",
          "product" : {
            "name" : "Fortinet FortiOS <7.0.14",
            "product_id" : "T032609"
          }
        }, {
          "category" : "product_version",
          "name" : "7.0.14",
          "product" : {
            "name" : "Fortinet FortiOS 7.0.14",
            "product_id" : "T032609-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:fortinet:fortios:7.0.14"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "FortiOS"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<7.4.2",
          "product" : {
            "name" : "Fortinet FortiProxy <7.4.2",
            "product_id" : "T031934"
          }
        }, {
          "category" : "product_version",
          "name" : "7.4.2",
          "product" : {
            "name" : "Fortinet FortiProxy 7.4.2",
            "product_id" : "T031934-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:fortinet:fortiproxy:7.4.2"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<7.2.8",
          "product" : {
            "name" : "Fortinet FortiProxy <7.2.8",
            "product_id" : "T032610"
          }
        }, {
          "category" : "product_version",
          "name" : "7.2.8",
          "product" : {
            "name" : "Fortinet FortiProxy 7.2.8",
            "product_id" : "T032610-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:fortinet:fortiproxy:7.2.8"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "7",
          "product" : {
            "name" : "Fortinet FortiProxy 7.0",
            "product_id" : "T032611",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:fortinet:fortiproxy:7.0"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "FortiProxy"
      } ],
      "category" : "vendor",
      "name" : "Fortinet"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Gentoo Linux",
        "product" : {
          "name" : "Gentoo Linux",
          "product_id" : "T012167",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:gentoo:linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Gentoo"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<1.21.3",
          "product" : {
            "name" : "Golang Go <1.21.3",
            "product_id" : "T030466"
          }
        }, {
          "category" : "product_version",
          "name" : "1.21.3",
          "product" : {
            "name" : "Golang Go 1.21.3",
            "product_id" : "T030466-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:golang:go:1.21.3"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<1.20.10",
          "product" : {
            "name" : "Golang Go <1.20.10",
            "product_id" : "T030467"
          }
        }, {
          "category" : "product_version",
          "name" : "1.20.10",
          "product" : {
            "name" : "Golang Go 1.20.10",
            "product_id" : "T030467-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:golang:go:1.20.10"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Go"
      } ],
      "category" : "vendor",
      "name" : "Golang"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Google Cloud Platform",
        "product" : {
          "name" : "Google Cloud Platform",
          "product_id" : "393401",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:google:cloud_platform:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Google"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "IBM App Connect Enterprise",
        "product" : {
          "name" : "IBM App Connect Enterprise",
          "product_id" : "T032495",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:ibm:app_connect_enterprise:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "IBM Business Automation Workflow",
        "product" : {
          "name" : "IBM Business Automation Workflow",
          "product_id" : "T019704",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:ibm:business_automation_workflow:-"
          }
        }
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "on Cloud Pak for Data",
          "product" : {
            "name" : "IBM DB2 on Cloud Pak for Data",
            "product_id" : "T042208",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:db2:on_cloud_pak_for_data"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "DB2"
      }, {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<10.0.1.16",
          "product" : {
            "name" : "IBM DataPower Gateway <10.0.1.16",
            "product_id" : "T030798"
          }
        }, {
          "category" : "product_version",
          "name" : "10.0.1.16",
          "product" : {
            "name" : "IBM DataPower Gateway 10.0.1.16",
            "product_id" : "T030798-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:datapower_gateway:10.0.1.16"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<10.5.0.8",
          "product" : {
            "name" : "IBM DataPower Gateway <10.5.0.8",
            "product_id" : "T030800"
          }
        }, {
          "category" : "product_version",
          "name" : "10.5.0.8",
          "product" : {
            "name" : "IBM DataPower Gateway 10.5.0.8",
            "product_id" : "T030800-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:datapower_gateway:10.5.0.8"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "DataPower Gateway"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "11.7",
          "product" : {
            "name" : "IBM InfoSphere Information Server 11.7",
            "product_id" : "444803",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:infosphere_information_server:11.7"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "InfoSphere Information Server"
      }, {
        "category" : "product_name",
        "name" : "IBM MQ",
        "product" : {
          "name" : "IBM MQ",
          "product_id" : "T021398",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:ibm:mq:-"
          }
        }
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "7.6.1",
          "product" : {
            "name" : "IBM Maximo Asset Management 7.6.1",
            "product_id" : "T033948",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:maximo_asset_management:7.6.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Maximo Asset Management"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "8.11.0.1",
          "product" : {
            "name" : "IBM Operational Decision Manager 8.11.0.1",
            "product_id" : "1587022",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:operational_decision_manager:8.11.0.1"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "8.12.0.1",
          "product" : {
            "name" : "IBM Operational Decision Manager 8.12.0.1",
            "product_id" : "1587024",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:operational_decision_manager:8.12.0.1"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "8.10.x",
          "product" : {
            "name" : "IBM Operational Decision Manager 8.10.x",
            "product_id" : "T027827",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:operational_decision_manager:8.10.x"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "8.11.x",
          "product" : {
            "name" : "IBM Operational Decision Manager 8.11.x",
            "product_id" : "T027828",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:operational_decision_manager:8.11.x"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "8.12.x",
          "product" : {
            "name" : "IBM Operational Decision Manager 8.12.x",
            "product_id" : "T030120",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:operational_decision_manager:8.12.x"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "9.0.0",
          "product" : {
            "name" : "IBM Operational Decision Manager 9.0.0",
            "product_id" : "T037718",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:operational_decision_manager:9.0.0"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Operational Decision Manager"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "v10",
          "product" : {
            "name" : "IBM Power Hardware Management Console v10",
            "product_id" : "T023373",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:hardware_management_console:v10"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Power Hardware Management Console"
      }, {
        "branches" : [ {
          "category" : "product_name",
          "name" : "IBM QRadar SIEM",
          "product" : {
            "name" : "IBM QRadar SIEM",
            "product_id" : "T021415",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:qradar_siem:-"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "7.5",
          "product" : {
            "name" : "IBM QRadar SIEM 7.5",
            "product_id" : "T022954",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:qradar_siem:7.5"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "QRadar SIEM"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "8.4",
          "product" : {
            "name" : "IBM SAN Volume Controller 8.4",
            "product_id" : "T021617",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:san_volume_controller:8.4"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "8.5",
          "product" : {
            "name" : "IBM SAN Volume Controller 8.5",
            "product_id" : "T026456",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:san_volume_controller:8.5"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "8.6",
          "product" : {
            "name" : "IBM SAN Volume Controller 8.6",
            "product_id" : "T035560",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:san_volume_controller:8.6"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "SAN Volume Controller"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "11.4",
          "product" : {
            "name" : "IBM Security Guardium 11.4",
            "product_id" : "1076561",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:security_guardium:11.4"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "11.5",
          "product" : {
            "name" : "IBM Security Guardium 11.5",
            "product_id" : "1411051",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:security_guardium:11.5"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "12",
          "product" : {
            "name" : "IBM Security Guardium 12.0",
            "product_id" : "T031092",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:security_guardium:12.0"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Security Guardium"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "10.0.0.0-10.0.6.1",
          "product" : {
            "name" : "IBM Security Verify Access 10.0.0.0-10.0.6.1",
            "product_id" : "T031895",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:security_verify_access:10.0.0.0_-_10.0.6.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Security Verify Access"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "5.1",
          "product" : {
            "name" : "IBM Spectrum Scale 5.1",
            "product_id" : "T021060",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:spectrum_scale:5.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Storage Scale"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "8.1",
          "product" : {
            "name" : "IBM TXSeries 8.1",
            "product_id" : "T029287",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:txseries:8.1"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "8.2",
          "product" : {
            "name" : "IBM TXSeries 8.2",
            "product_id" : "T029288",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:txseries:8.2"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "9.1",
          "product" : {
            "name" : "IBM TXSeries 9.1",
            "product_id" : "T029292",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:txseries:9.1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "TXSeries"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "Liberty",
          "product" : {
            "name" : "IBM WebSphere Application Server Liberty",
            "product_id" : "T011504",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:ibm:websphere_application_server:liberty"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "WebSphere Application Server"
      } ],
      "category" : "vendor",
      "name" : "IBM"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<weekly 2.428",
          "product" : {
            "name" : "Jenkins Jenkins <weekly 2.428",
            "product_id" : "T030677"
          }
        }, {
          "category" : "product_version",
          "name" : "weekly 2.428",
          "product" : {
            "name" : "Jenkins Jenkins weekly 2.428",
            "product_id" : "T030677-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cloudbees:jenkins:weekly_2.428"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<LTS 2.414.3",
          "product" : {
            "name" : "Jenkins Jenkins <LTS 2.414.3",
            "product_id" : "T030678"
          }
        }, {
          "category" : "product_version",
          "name" : "LTS 2.414.3",
          "product" : {
            "name" : "Jenkins Jenkins LTS 2.414.3",
            "product_id" : "T030678-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:cloudbees:jenkins:lts_2.414.3"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Jenkins"
      } ],
      "category" : "vendor",
      "name" : "Jenkins"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version",
          "name" : "MDS-G4028-L3 Series",
          "product" : {
            "name" : "Moxa Switch MDS-G4028-L3 Series",
            "product_id" : "T038734",
            "product_identification_helper" : {
              "cpe" : "cpe:/h:moxa:switch:mds-g4028-l3_series"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "EDS-G512E",
          "product" : {
            "name" : "Moxa Switch EDS-G512E",
            "product_id" : "T038749",
            "product_identification_helper" : {
              "cpe" : "cpe:/h:moxa:switch:eds-g512e"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Switch"
      } ],
      "category" : "vendor",
      "name" : "Moxa"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "NGINX NGINX",
        "product" : {
          "name" : "NGINX NGINX",
          "product_id" : "T015266",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:nginx:nginx:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "NGINX"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<7.3.1",
          "product" : {
            "name" : "Open Source Varnish HTTP Cache <7.3.1",
            "product_id" : "T031066"
          }
        }, {
          "category" : "product_version",
          "name" : "7.3.1",
          "product" : {
            "name" : "Open Source Varnish HTTP Cache 7.3.1",
            "product_id" : "T031066-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:varnish_http_accelerator_integration_project:varnish:7.3.1"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<7.4.2",
          "product" : {
            "name" : "Open Source Varnish HTTP Cache <7.4.2",
            "product_id" : "T031067"
          }
        }, {
          "category" : "product_version",
          "name" : "7.4.2",
          "product" : {
            "name" : "Open Source Varnish HTTP Cache 7.4.2",
            "product_id" : "T031067-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:varnish_http_accelerator_integration_project:varnish:7.4.2"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<6.0.12 LTS",
          "product" : {
            "name" : "Open Source Varnish HTTP Cache <6.0.12 LTS",
            "product_id" : "T031068"
          }
        }, {
          "category" : "product_version",
          "name" : "6.0.12 LTS",
          "product" : {
            "name" : "Open Source Varnish HTTP Cache 6.0.12 LTS",
            "product_id" : "T031068-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:varnish_http_accelerator_integration_project:varnish:6.0.12_lts"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Varnish HTTP Cache"
      } ],
      "category" : "vendor",
      "name" : "Open Source"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Oracle Linux",
        "product" : {
          "name" : "Oracle Linux",
          "product_id" : "T004914",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:oracle:linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Oracle"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "RESF Rocky Linux",
        "product" : {
          "name" : "RESF Rocky Linux",
          "product_id" : "T032255",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:resf:rocky_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "RESF"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<11.6.10",
          "product" : {
            "name" : "RealObjects PDFreactor <11.6.10",
            "product_id" : "T032023"
          }
        }, {
          "category" : "product_version",
          "name" : "11.6.10",
          "product" : {
            "name" : "RealObjects PDFreactor 11.6.10",
            "product_id" : "T032023-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:realobjects:pdfreactor:11.6.10"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "PDFreactor"
      } ],
      "category" : "vendor",
      "name" : "RealObjects"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_name",
          "name" : "Red Hat Enterprise Linux",
          "product" : {
            "name" : "Red Hat Enterprise Linux",
            "product_id" : "67646",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:redhat:enterprise_linux:-"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "Software Collections",
          "product" : {
            "name" : "Red Hat Enterprise Linux Software Collections",
            "product_id" : "T031234",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:redhat:enterprise_linux:software_collections"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "AMQ Streams 2",
          "product" : {
            "name" : "Red Hat Enterprise Linux AMQ Streams 2",
            "product_id" : "T037463",
            "product_identification_helper" : {
              "cpe" : "cpe:/o:redhat:enterprise_linux:amq_streams_2"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Enterprise Linux"
      }, {
        "branches" : [ {
          "category" : "product_version",
          "name" : "Service Registry 1",
          "product" : {
            "name" : "Red Hat Integration Service Registry 1",
            "product_id" : "T031465",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:integration:service_registry_1"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Integration"
      }, {
        "branches" : [ {
          "category" : "product_name",
          "name" : "Red Hat OpenShift",
          "product" : {
            "name" : "Red Hat OpenShift",
            "product_id" : "367115",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:-"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.11",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.11",
            "product_id" : "T025990",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform_4.11"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.12",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.12",
            "product_id" : "T026435",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform_4.12"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.10",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.10",
            "product_id" : "T027233",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform_4.10"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<Container  4.11.54",
          "product" : {
            "name" : "Red Hat OpenShift <Container  4.11.54",
            "product_id" : "T031389"
          }
        }, {
          "category" : "product_version",
          "name" : "Container  4.11.54",
          "product" : {
            "name" : "Red Hat OpenShift Container  4.11.54",
            "product_id" : "T031389-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container__4.11.54"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<Container Platform 4.11.54",
          "product" : {
            "name" : "Red Hat OpenShift <Container Platform 4.11.54",
            "product_id" : "T031390"
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.11.54",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.11.54",
            "product_id" : "T031390-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform_4.11.54"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<container platform 4.14.4",
          "product" : {
            "name" : "Red Hat OpenShift <container platform 4.14.4",
            "product_id" : "T031393"
          }
        }, {
          "category" : "product_version",
          "name" : "container platform 4.14.4",
          "product" : {
            "name" : "Red Hat OpenShift container platform 4.14.4",
            "product_id" : "T031393-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform_4.14.4"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "Container Platform <4.14.7",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform <4.14.7",
            "product_id" : "T031849"
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.14.7",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.14.7",
            "product_id" : "T031849-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform__4.14.7"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "Container Platform <4.12.48",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform <4.12.48",
            "product_id" : "T032442"
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.12.48",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.12.48",
            "product_id" : "T032442-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform__4.12.48"
            }
          }
        }, {
          "category" : "product_version",
          "name" : "Kube Descheduler Operator 5",
          "product" : {
            "name" : "Red Hat OpenShift Kube Descheduler Operator 5",
            "product_id" : "T033270",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:kube_descheduler_operator_5"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "Container Platform <4.13.36",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform <4.13.36",
            "product_id" : "T033271"
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.13.36",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.13.36",
            "product_id" : "T033271-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform__4.13.36"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "Container Platform <4.15.5",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform <4.15.5",
            "product_id" : "T033704"
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.15.5",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.15.5",
            "product_id" : "T033704-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform__4.15.5"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "Container Platform <4.15.39",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform <4.15.39",
            "product_id" : "T039437"
          }
        }, {
          "category" : "product_version",
          "name" : "Container Platform 4.15.39",
          "product" : {
            "name" : "Red Hat OpenShift Container Platform 4.15.39",
            "product_id" : "T039437-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:redhat:openshift:container_platform__4.15.39"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "OpenShift"
      } ],
      "category" : "vendor",
      "name" : "Red Hat"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "SUSE Linux",
        "product" : {
          "name" : "SUSE Linux",
          "product_id" : "T002207",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:suse:suse_linux:-"
          }
        }
      }, {
        "category" : "product_name",
        "name" : "SUSE openSUSE",
        "product" : {
          "name" : "SUSE openSUSE",
          "product_id" : "T027843",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:suse:opensuse:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "SUSE"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version",
          "name" : "1500 CPU",
          "product" : {
            "name" : "Siemens SIMATIC S7 1500 CPU",
            "product_id" : "T025776",
            "product_identification_helper" : {
              "cpe" : "cpe:/h:siemens:simatic_s7:1500_cpu"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "SIMATIC S7"
      } ],
      "category" : "vendor",
      "name" : "Siemens"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Specification http/2",
        "product" : {
          "name" : "Specification http/2",
          "product_id" : "T030386",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:ietf:http2:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Specification"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version_range",
          "name" : "<9.3.1",
          "product" : {
            "name" : "Splunk Splunk Enterprise <9.3.1",
            "product_id" : "T038314"
          }
        }, {
          "category" : "product_version",
          "name" : "9.3.1",
          "product" : {
            "name" : "Splunk Splunk Enterprise 9.3.1",
            "product_id" : "T038314-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:splunk:splunk:9.3.1"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<9.2.3",
          "product" : {
            "name" : "Splunk Splunk Enterprise <9.2.3",
            "product_id" : "T038315"
          }
        }, {
          "category" : "product_version",
          "name" : "9.2.3",
          "product" : {
            "name" : "Splunk Splunk Enterprise 9.2.3",
            "product_id" : "T038315-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:splunk:splunk:9.2.3"
            }
          }
        }, {
          "category" : "product_version_range",
          "name" : "<9.1.6",
          "product" : {
            "name" : "Splunk Splunk Enterprise <9.1.6",
            "product_id" : "T038316"
          }
        }, {
          "category" : "product_version",
          "name" : "9.1.6",
          "product" : {
            "name" : "Splunk Splunk Enterprise 9.1.6",
            "product_id" : "T038316-fixed",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:splunk:splunk:9.1.6"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "Splunk Enterprise"
      } ],
      "category" : "vendor",
      "name" : "Splunk"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Ubuntu Linux",
        "product" : {
          "name" : "Ubuntu Linux",
          "product_id" : "T000126",
          "product_identification_helper" : {
            "cpe" : "cpe:/o:canonical:ubuntu_linux:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Ubuntu"
    }, {
      "branches" : [ {
        "category" : "product_name",
        "name" : "Veritas Enterprise Vault",
        "product" : {
          "name" : "Veritas Enterprise Vault",
          "product_id" : "T017967",
          "product_identification_helper" : {
            "cpe" : "cpe:/a:veritas:enterprise_vault:-"
          }
        }
      } ],
      "category" : "vendor",
      "name" : "Veritas"
    }, {
      "branches" : [ {
        "branches" : [ {
          "category" : "product_version",
          "name" : "v9",
          "product" : {
            "name" : "Xerox FreeFlow Print Server v9",
            "product_id" : "T015632",
            "product_identification_helper" : {
              "cpe" : "cpe:/a:xerox:freeflow_print_server:v9"
            }
          }
        } ],
        "category" : "product_name",
        "name" : "FreeFlow Print Server"
      } ],
      "category" : "vendor",
      "name" : "Xerox"
    } ]
  },
  "vulnerabilities" : [ {
    "cve" : "CVE-2023-44487",
    "product_status" : {
      "known_affected" : [ "T031895", "T031933", "T029292", "T033271", "T033270", "T031092", "398363", "T025776", "T033948", "T031389", "T021060", "T021617", "T038734", "T012167", "T022954", "2951", "T019704", "T027843", "T031934", "T031234", "T030386", "616020", "T032442", "T021398", "T025990", "T045881", "T029288", "T032610", "T029287", "T032611", "T030677", "T030798", "T033704", "T031801", "T030678", "T031800", "T038314", "T035560", "T038315", "T038316", "T037463", "T027827", "T027828", "T045879", "T000126", "367115", "T026456", "T032608", "T032609", "T037718", "T030800", "T004914", "T032023", "T030120", "T021415", "T031849", "T027233", "T031465", "T031068", "1076561", "T015632", "T031067", "T031066", "T002207", "444803", "T017967", "T026435", "T011504", "T031795", "T031794", "T030466", "T031797", "T031796", "T031799", "67646", "T030467", "T031798", "T038749", "T042208", "T031390", "393401", "T031393", "T039437", "T031791", "T015266", "T031790", "T031793", "T031792", "T047343", "1587022", "T029478", "T023373", "1587024", "T047344", "T032377", "T032378", "2143", "T032255", "74185", "T032495", "T019841", "1411051" ]
    },
    "release_date" : "2023-10-10T22:00:00.000+00:00",
    "title" : "CVE-2023-44487"
  } ]
}