{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Medium"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"exempi security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for exempi is now available for openEuler-24.03-LTS",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Exempi is an implementation of XMP. Version 2.x is based on Adobe XMP SDK and released under a BSD-style license like Adobe&apos;s.\n\nSecurity Fix(es):\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30305)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30306)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30307)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30308)\n\nXMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.(CVE-2025-30309)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for exempi is now available for openEuler-24.03-LTS.\n\nopenEuler Security has rated this update as having a security impact of medium. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Medium",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"exempi",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-2293",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2293"
			},
			{
				"summary":"CVE-2025-30305",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-30305&packageName=exempi"
			},
			{
				"summary":"CVE-2025-30306",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-30306&packageName=exempi"
			},
			{
				"summary":"CVE-2025-30307",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-30307&packageName=exempi"
			},
			{
				"summary":"CVE-2025-30308",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-30308&packageName=exempi"
			},
			{
				"summary":"CVE-2025-30309",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-30309&packageName=exempi"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30305"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30306"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30307"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30308"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-30309"
			},
			{
				"summary":"openEuler-SA-2025-2293 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-2293.json"
			}
		],
		"title":"An update for exempi is now available for openEuler-24.03-LTS",
		"tracking":{
			"initial_release_date":"2025-09-12T22:29:39+08:00",
			"revision_history":[
				{
					"date":"2025-09-12T22:29:39+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-09-12T22:29:39+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-09-12T22:29:39+08:00",
			"id":"openEuler-SA-2025-2293",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-2.6.4-2.oe2403.x86_64.rpm",
									"name":"exempi-2.6.4-2.oe2403.x86_64.rpm"
								},
								"name":"exempi-2.6.4-2.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-debuginfo-2.6.4-2.oe2403.x86_64.rpm",
									"name":"exempi-debuginfo-2.6.4-2.oe2403.x86_64.rpm"
								},
								"name":"exempi-debuginfo-2.6.4-2.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-debugsource-2.6.4-2.oe2403.x86_64.rpm",
									"name":"exempi-debugsource-2.6.4-2.oe2403.x86_64.rpm"
								},
								"name":"exempi-debugsource-2.6.4-2.oe2403.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-devel-2.6.4-2.oe2403.x86_64.rpm",
									"name":"exempi-devel-2.6.4-2.oe2403.x86_64.rpm"
								},
								"name":"exempi-devel-2.6.4-2.oe2403.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-help-2.6.4-2.oe2403.noarch.rpm",
									"name":"exempi-help-2.6.4-2.oe2403.noarch.rpm"
								},
								"name":"exempi-help-2.6.4-2.oe2403.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-2.6.4-2.oe2403.aarch64.rpm",
									"name":"exempi-2.6.4-2.oe2403.aarch64.rpm"
								},
								"name":"exempi-2.6.4-2.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-debuginfo-2.6.4-2.oe2403.aarch64.rpm",
									"name":"exempi-debuginfo-2.6.4-2.oe2403.aarch64.rpm"
								},
								"name":"exempi-debuginfo-2.6.4-2.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-debugsource-2.6.4-2.oe2403.aarch64.rpm",
									"name":"exempi-debugsource-2.6.4-2.oe2403.aarch64.rpm"
								},
								"name":"exempi-debugsource-2.6.4-2.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-devel-2.6.4-2.oe2403.aarch64.rpm",
									"name":"exempi-devel-2.6.4-2.oe2403.aarch64.rpm"
								},
								"name":"exempi-devel-2.6.4-2.oe2403.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"exempi-2.6.4-2.oe2403.src.rpm",
									"name":"exempi-2.6.4-2.oe2403.src.rpm"
								},
								"name":"exempi-2.6.4-2.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-2.6.4-2.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
					"name":"exempi-2.6.4-2.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-debuginfo-2.6.4-2.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
					"name":"exempi-debuginfo-2.6.4-2.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-debugsource-2.6.4-2.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
					"name":"exempi-debugsource-2.6.4-2.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-devel-2.6.4-2.oe2403.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
					"name":"exempi-devel-2.6.4-2.oe2403.x86_64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-help-2.6.4-2.oe2403.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
					"name":"exempi-help-2.6.4-2.oe2403.noarch as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-2.6.4-2.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
					"name":"exempi-2.6.4-2.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-debuginfo-2.6.4-2.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
					"name":"exempi-debuginfo-2.6.4-2.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-debugsource-2.6.4-2.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
					"name":"exempi-debugsource-2.6.4-2.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-devel-2.6.4-2.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
					"name":"exempi-devel-2.6.4-2.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"exempi-2.6.4-2.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src",
					"name":"exempi-2.6.4-2.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2025-30305",
			"notes":[
				{
					"text":"XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					],
					"details":"exempi security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2293"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-30305"
		},
		{
			"cve":"CVE-2025-30306",
			"notes":[
				{
					"text":"XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					],
					"details":"exempi security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2293"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-30306"
		},
		{
			"cve":"CVE-2025-30307",
			"notes":[
				{
					"text":"XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					],
					"details":"exempi security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2293"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-30307"
		},
		{
			"cve":"CVE-2025-30308",
			"notes":[
				{
					"text":"XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					],
					"details":"exempi security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2293"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-30308"
		},
		{
			"cve":"CVE-2025-30309",
			"notes":[
				{
					"text":"XMP Toolkit versions 2023.12 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
					"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
					"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					],
					"details":"exempi security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2293"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":5.5,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
						"version":"3.1"
					},
					"products":[
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.x86_64",
						"openEuler-24.03-LTS:exempi-help-2.6.4-2.oe2403.noarch",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debuginfo-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-debugsource-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-devel-2.6.4-2.oe2403.aarch64",
						"openEuler-24.03-LTS:exempi-2.6.4-2.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2025-30309"
		}
	]
}