Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-21244 (GCVE-0-2024-21244)
Vulnerability from cvelistv5 – Published: 2024-10-15 19:52 – Updated: 2025-11-03 21:53- Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.
| URL | Tags |
|---|---|
| https://www.oracle.com/security-alerts/cpuoct2024.html | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Oracle Corporation | MySQL Server |
Affected:
* , ≤ 8.4.2
(custom)
Affected: * , ≤ 9.0.1 (custom) cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:* cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:* |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21244",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-16T19:09:30.925309Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-25T16:45:52.802Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-03T21:53:23.464Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20241101-0008/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"cpes": [
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*"
],
"product": "MySQL Server",
"vendor": "Oracle Corporation",
"versions": [
{
"lessThanOrEqual": "8.4.2",
"status": "affected",
"version": "*",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.0.1",
"status": "affected",
"version": "*",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-15T19:52:49.601Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2024-21244",
"datePublished": "2024-10-15T19:52:49.601Z",
"dateReserved": "2023-12-07T22:28:10.699Z",
"dateUpdated": "2025-11-03T21:53:23.464Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2024-21244",
"date": "2026-05-19",
"epss": "0.00259",
"percentile": "0.49264"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.4.0\", \"versionEndIncluding\": \"8.4.2\", \"matchCriteriaId\": \"8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD1DFA06-03A1-41E6-BF09-156C1084A811\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9067C169-3091-459A-A8C1-4E79152B18F5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Telemetry). Las versiones compatibles afectadas son 8.4.2 y anteriores y 9.0.1 y anteriores. Esta vulnerabilidad, que es dif\\u00edcil de explotar, permite que un atacante con privilegios elevados y acceso a la red a trav\\u00e9s de m\\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de MySQL Server. Puntuaci\\u00f3n base CVSS 3.1 2.2 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).\"}]",
"id": "CVE-2024-21244",
"lastModified": "2024-10-16T20:35:00.173",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secalert_us@oracle.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N\", \"baseScore\": 2.2, \"baseSeverity\": \"LOW\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 0.7, \"impactScore\": 1.4}]}",
"published": "2024-10-15T20:15:14.130",
"references": "[{\"url\": \"https://www.oracle.com/security-alerts/cpuoct2024.html\", \"source\": \"secalert_us@oracle.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-21244\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2024-10-15T20:15:14.130\",\"lastModified\":\"2025-11-03T22:16:44.583\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Telemetry). Las versiones compatibles afectadas son 8.4.2 y anteriores y 9.0.1 y anteriores. Esta vulnerabilidad, que es dif\u00edcil de explotar, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de MySQL Server. Puntuaci\u00f3n base CVSS 3.1 2.2 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":2.2,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.7,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.4.0\",\"versionEndIncluding\":\"8.4.2\",\"matchCriteriaId\":\"8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1DFA06-03A1-41E6-BF09-156C1084A811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9067C169-3091-459A-A8C1-4E79152B18F5\"}]}]}],\"references\":[{\"url\":\"https://www.oracle.com/security-alerts/cpuoct2024.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241101-0008/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20241101-0008/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T21:53:23.464Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21244\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-16T19:09:30.925309Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-16T19:09:35.560Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 2.2, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*\", \"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*\"], \"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.4.2\"}, {\"status\": \"affected\", \"version\": \"*\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.0.1\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpuoct2024.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2024-10-15T19:52:49.601Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-21244\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T21:53:23.464Z\", \"dateReserved\": \"2023-12-07T22:28:10.699Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2024-10-15T19:52:49.601Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2024-AVI-0884
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 9.0.0 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.38 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 9.0.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.38 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21262"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21204"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0884",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2024",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
CERTFR-2024-AVI-0884
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Enterprise Monitor version 8.0.39 et antérieures | ||
| Oracle | MySQL | MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Connectors versions 9.0.0 et antérieures | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.38 et antérieures | ||
| Oracle | MySQL | MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et antérieures | ||
| Oracle | MySQL | MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et antérieures |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Enterprise Monitor version 8.0.39 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors versions 9.0.0 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.38 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 7.5.35, 7.6.31, 8.0.39, 8.4.2 et 9.0.1 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21262"
},
{
"name": "CVE-2024-21200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21200"
},
{
"name": "CVE-2024-21231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21231"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21247"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21218"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-21237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21237"
},
{
"name": "CVE-2024-21203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21203"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-21272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21272"
},
{
"name": "CVE-2024-21204",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21204"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21238"
},
{
"name": "CVE-2024-21230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21230"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0884",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2024",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
]
}
CERTFR-2026-AVI-0556
Vulnerability from certfr_avis - Published: 2026-05-11 - Updated: 2026-05-11
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 31.3.x antérieures à 3.13.15 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server For Kubernetes versions antérieures à 1.3.0 | ||
| VMware | Tanzu | Tanzu Data Flow on Kubernetes versions antérieures à 2.1.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.0.x antérieures à 4.0.20 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à1.33.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.9.3 | ||
| VMware | Tanzu | Tanzu for Valkey on Kubernetes versions antérieures à 3.3.4 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions 6.17.x antérieures à 6.17.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum on Kubernetes versions antérieures à 1.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Platform Extension Framework versions antérieures à 8.0.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.2.x antérieures à 4.2.6 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Text versions antérieures à 4.0.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.3.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.3.x antérieures à 4.3.0 | ||
| VMware | Tanzu | Tanzu for Valkey on Kubernetes versions antérieures à 3.4.0 | ||
| VMware | Tanzu Gemfire | Tanzu GemFire versions antérieures à 10.2.3 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Upgrade versions antérieures à 2.0.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplumversions antérieures à 7.8.0 | ||
| VMware | Tanzu Gemfire | Tanzu GemFire Vector Database versions antérieures à 1.2.2 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.33.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions 7.7.x antérieures à 7.7.0 | ||
| VMware | Tanzu | Tanzu RabbitMQ on Kubernetes versions 4.1.x antérieures à 4.1.11 | ||
| VMware | Tanzu | Tanzu for MySQL on Kubernetes versions antérieures à 2.0.3 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu RabbitMQ on Kubernetes versions 31.3.x ant\u00e9rieures \u00e0 3.13.15",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server For Kubernetes versions ant\u00e9rieures \u00e0 1.3.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Flow on Kubernetes versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.0.x ant\u00e9rieures \u00e0 4.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e01.33.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.9.3",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey on Kubernetes versions ant\u00e9rieures \u00e0 3.3.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions 6.17.x ant\u00e9rieures \u00e0 6.17.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum on Kubernetes versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Platform Extension Framework versions ant\u00e9rieures \u00e0 8.0.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.2.x ant\u00e9rieures \u00e0 4.2.6",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Text versions ant\u00e9rieures \u00e0 4.0.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.3.x ant\u00e9rieures \u00e0 4.3.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey on Kubernetes versions ant\u00e9rieures \u00e0 3.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu GemFire versions ant\u00e9rieures \u00e0 10.2.3",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Upgrade versions ant\u00e9rieures \u00e0 2.0.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplumversions ant\u00e9rieures \u00e0 7.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire Vector Database versions ant\u00e9rieures \u00e0 1.2.2",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.33.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions 7.7.x ant\u00e9rieures \u00e0 7.7.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ on Kubernetes versions 4.1.x ant\u00e9rieures \u00e0 4.1.11",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Kubernetes versions ant\u00e9rieures \u00e0 2.0.3\n",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2018-19361",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19361"
},
{
"name": "CVE-2019-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12384"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2026-27135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27135"
},
{
"name": "CVE-2019-17267",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17267"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2018-19362",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19362"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2026-33871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33871"
},
{
"name": "CVE-2026-22737",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22737"
},
{
"name": "CVE-2020-26939",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26939"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2026-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4878"
},
{
"name": "CVE-2026-35238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35238"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2026-27205",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27205"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2026-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32990"
},
{
"name": "CVE-2022-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30973"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2026-1669",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1669"
},
{
"name": "CVE-2026-39892",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39892"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2026-33186",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33186"
},
{
"name": "CVE-2021-27906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27906"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2018-14719",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14719"
},
{
"name": "CVE-2026-34267",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34267"
},
{
"name": "CVE-2023-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2016-1000341",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000341"
},
{
"name": "CVE-2026-32286",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32286"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2020-9546",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9546"
},
{
"name": "CVE-2020-13956",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13956"
},
{
"name": "CVE-2026-35239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35239"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2026-25990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25990"
},
{
"name": "CVE-2026-32288",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32288"
},
{
"name": "CVE-2021-36373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36373"
},
{
"name": "CVE-2020-10673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10673"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2020-35728",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35728"
},
{
"name": "CVE-2026-0897",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0897"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2026-34271",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34271"
},
{
"name": "CVE-2019-10094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10094"
},
{
"name": "CVE-2026-24308",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24308"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2020-36181",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36181"
},
{
"name": "CVE-2020-9548",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9548"
},
{
"name": "CVE-2026-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3446"
},
{
"name": "CVE-2026-32875",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32875"
},
{
"name": "CVE-2020-36182",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36182"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2016-1000343",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000343"
},
{
"name": "CVE-2020-24616",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24616"
},
{
"name": "CVE-2020-10683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10683"
},
{
"name": "CVE-2022-24613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24613"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2026-27456",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27456"
},
{
"name": "CVE-2026-22701",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22701"
},
{
"name": "CVE-2026-34270",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34270"
},
{
"name": "CVE-2026-34303",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34303"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-36185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36185"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2018-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8036"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2022-26612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26612"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2026-27143",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27143"
},
{
"name": "CVE-2019-16942",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16942"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2026-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22009"
},
{
"name": "CVE-2018-1320",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1320"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2020-9547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9547"
},
{
"name": "CVE-2026-29145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29145"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-49128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49128"
},
{
"name": "CVE-2026-21998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21998"
},
{
"name": "CVE-2019-17558",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17558"
},
{
"name": "CVE-2020-36179",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36179"
},
{
"name": "CVE-2026-35469",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35469"
},
{
"name": "CVE-2020-13955",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13955"
},
{
"name": "CVE-2018-14718",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14718"
},
{
"name": "CVE-2020-10650",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10650"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-66516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66516"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2016-1000346",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000346"
},
{
"name": "CVE-2020-36186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36186"
},
{
"name": "CVE-2020-36189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36189"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2020-35490",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35490"
},
{
"name": "CVE-2026-35236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35236"
},
{
"name": "CVE-2026-33870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33870"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2021-20190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20190"
},
{
"name": "CVE-2021-35516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35516"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2018-19360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19360"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2026-5121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5121"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2026-35237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35237"
},
{
"name": "CVE-2014-0114",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0114"
},
{
"name": "CVE-2026-33236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33236"
},
{
"name": "CVE-2022-32287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32287"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2019-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16335"
},
{
"name": "CVE-2016-1000345",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000345"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2022-39135",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39135"
},
{
"name": "CVE-2025-33042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33042"
},
{
"name": "CVE-2026-34073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34073"
},
{
"name": "CVE-2026-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27144"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22017"
},
{
"name": "CVE-2022-26336",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26336"
},
{
"name": "CVE-2024-21244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21244"
},
{
"name": "CVE-2026-32283",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32283"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2019-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14893"
},
{
"name": "CVE-2018-1338",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1338"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2021-29262",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29262"
},
{
"name": "CVE-2020-11113",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11113"
},
{
"name": "CVE-2024-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21503"
},
{
"name": "CVE-2016-1000338",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000338"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2026-25645",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25645"
},
{
"name": "CVE-2026-21860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21860"
},
{
"name": "CVE-2026-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3479"
},
{
"name": "CVE-2024-52012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52012"
},
{
"name": "CVE-2021-35517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35517"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2026-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-39883"
},
{
"name": "CVE-2026-4424",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4424"
},
{
"name": "CVE-2019-10088",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10088"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2026-32281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32281"
},
{
"name": "CVE-2026-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1839"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2026-34515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34515"
},
{
"name": "CVE-2026-5598",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-5598"
},
{
"name": "CVE-2026-34519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34519"
},
{
"name": "CVE-2018-11797",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11797"
},
{
"name": "CVE-2026-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22022"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2026-34304",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34304"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2024-23454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23454"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2026-30922",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-30922"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2020-10672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10672"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2019-14439",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14439"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2018-8017",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8017"
},
{
"name": "CVE-2020-10969",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10969"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-11143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11143"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2026-34986",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34986"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2020-36187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36187"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2017-15691",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15691"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2022-38749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38749"
},
{
"name": "CVE-2026-22002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22002"
},
{
"name": "CVE-2021-36090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36090"
},
{
"name": "CVE-2026-34518",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34518"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2016-1000342",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000342"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2018-17197",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17197"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2020-11620",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11620"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2026-34308",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34308"
},
{
"name": "CVE-2016-1000339",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000339"
},
{
"name": "CVE-2018-12022",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12022"
},
{
"name": "CVE-2026-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3219"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2023-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21499"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2026-27199",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27199"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2020-1945",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1945"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2021-23926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23926"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2026-22731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22731"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-68146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68146"
},
{
"name": "CVE-2020-24750",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24750"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2026-34525",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34525"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2026-22732",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22732"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2020-9492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9492"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2026-32274",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32274"
},
{
"name": "CVE-2026-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-40192"
},
{
"name": "CVE-2026-35240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-35240"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2026-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22004"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2018-1324",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1324"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2026-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22001"
},
{
"name": "CVE-2026-32874",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32874"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2026-4539",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4539"
},
{
"name": "CVE-2019-16943",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16943"
},
{
"name": "CVE-2021-31812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31812"
},
{
"name": "CVE-2026-4519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4519"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2026-32289",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32289"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2021-37404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37404"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2026-4111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4111"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-66034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66034"
},
{
"name": "CVE-2019-20330",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20330"
},
{
"name": "CVE-2020-14195",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14195"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2019-12814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12814"
},
{
"name": "CVE-2020-35491",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35491"
},
{
"name": "CVE-2019-17531",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17531"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2026-3298",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3298"
},
{
"name": "CVE-2026-6100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-6100"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2026-32280",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32280"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-21232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21232"
},
{
"name": "CVE-2020-14061",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14061"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2026-4224",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4224"
},
{
"name": "CVE-2021-22569",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22569"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2020-11619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11619"
},
{
"name": "CVE-2019-12415",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12415"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2020-36183",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36183"
},
{
"name": "CVE-2026-25854",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25854"
},
{
"name": "CVE-2026-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22015"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2021-22573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22573"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2020-8840",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8840"
},
{
"name": "CVE-2026-1519",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1519"
},
{
"name": "CVE-2026-2332",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2332"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2018-11761",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11761"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2018-11771",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11771"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2018-1335",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1335"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-21493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21493"
},
{
"name": "CVE-2022-41854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41854"
},
{
"name": "CVE-2018-11762",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11762"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2026-22733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22733"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2020-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36184"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2026-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22005"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2016-1000340",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000340"
},
{
"name": "CVE-2026-34516",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34516"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2020-36180",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36180"
},
{
"name": "CVE-2018-12023",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12023"
},
{
"name": "CVE-2026-3644",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3644"
},
{
"name": "CVE-2026-27140",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27140"
},
{
"name": "CVE-2022-25857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25857"
},
{
"name": "CVE-2022-38751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38751"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2018-14720",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14720"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-29129",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29129"
},
{
"name": "CVE-2022-31159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
},
{
"name": "CVE-2026-22735",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22735"
},
{
"name": "CVE-2026-34517",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34517"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2020-15522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15522"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2018-1339",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1339"
},
{
"name": "CVE-2016-1000352",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000352"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-14009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14009"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2019-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14540"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2018-14721",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14721"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2026-33810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33810"
},
{
"name": "CVE-2022-38752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38752"
},
{
"name": "CVE-2026-34278",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34278"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2026-34513",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34513"
},
{
"name": "CVE-2023-24998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24998"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2022-38750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38750"
},
{
"name": "CVE-2026-32282",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32282"
},
{
"name": "CVE-2026-34514",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34514"
},
{
"name": "CVE-2018-11307",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11307"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2019-10086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10086"
},
{
"name": "CVE-2020-10968",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10968"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-1194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1194"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2026-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-4786"
},
{
"name": "CVE-2020-25649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25649"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2016-1000344",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000344"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2017-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3164"
},
{
"name": "CVE-2026-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-41066"
},
{
"name": "CVE-2026-34520",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34520"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2019-14379",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14379"
},
{
"name": "CVE-2026-24880",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24880"
},
{
"name": "CVE-2021-35515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35515"
},
{
"name": "CVE-2026-33816",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33816"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2017-7669",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7669"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2019-0193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0193"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2026-33231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33231"
},
{
"name": "CVE-2022-30126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30126"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-11112",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11112"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2018-1000180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000180"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2026-34276",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34276"
},
{
"name": "CVE-2022-24614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24614"
},
{
"name": "CVE-2026-22815",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22815"
},
{
"name": "CVE-2020-13959",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13959"
},
{
"name": "CVE-2025-24814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24814"
},
{
"name": "CVE-2020-11111",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11111"
},
{
"name": "CVE-2020-11979",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11979"
},
{
"name": "CVE-2025-67221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67221"
},
{
"name": "CVE-2024-21243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21243"
},
{
"name": "CVE-2026-33230",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-33230"
},
{
"name": "CVE-2021-31811",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31811"
},
{
"name": "CVE-2021-27807",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27807"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2026-24281",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24281"
},
{
"name": "CVE-2026-1462",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1462"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2022-25168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25168"
},
{
"name": "CVE-2026-34293",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-34293"
},
{
"name": "CVE-2020-14060",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14060"
},
{
"name": "CVE-2020-36188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36188"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2018-11802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11802"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2018-11796",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11796"
},
{
"name": "CVE-2020-13957",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13957"
},
{
"name": "CVE-2019-14892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14892"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2018-1000632",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000632"
},
{
"name": "CVE-2026-0846",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0846"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
},
{
"name": "CVE-2020-14062",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14062"
}
],
"initial_release_date": "2026-05-11T00:00:00",
"last_revision_date": "2026-05-11T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0556",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-05-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37451",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37451"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37445",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37445"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37460",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37460"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37449",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37449"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37450",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37450"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37466",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37466"
},
{
"published_at": "2026-05-08",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37468",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37468"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37444",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37444"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37461",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37461"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2016-11",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37459"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37446",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37446"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37465",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37465"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37448",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37448"
},
{
"published_at": "2026-05-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37447",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37447"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37463",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37463"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37452",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37452"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37462",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37462"
},
{
"published_at": "2026-05-07",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37464",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37464"
}
]
}
BDU:2024-08293
Vulnerability from fstec - Published: 07.12.2023{
"CVSS 2.0": "AV:N/AC:H/Au:S/C:P/I:N/A:N",
"CVSS 3.0": "AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 8.4.2 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server), 9.0.1 (MySQL Server), 9.0.0 (MySQL Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.oracle.com/security-alerts/cpuoct2024.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "07.12.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.10.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.10.2024",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-08293",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-21244",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "MySQL Server",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: Telemetry \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20), \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: Telemetry \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Server \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u043e\u0439 \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 MySQL",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.oracle.com/security-alerts/cpuoct2024.html\nhttps://www.cybersecurity-help.cz/vdb/SB20241015210\nhttps://vuldb.com/?id.280495",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20, CWE-200",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,1)\n\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 2,2)"
}
CNVD-2025-18133
Vulnerability from cnvd - Published: 2025-08-12厂商已发布了漏洞修复程序,请及时关注更新: https://www.oracle.com/security-alerts/cpuoct2024.html
| Name | ['Oracle MySQL Server <=8.4.2', 'Oracle MySQL Server <=9.0.1'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-21244",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2024-21244"
}
},
"description": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\n\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bfb\u53d6\u53ef\u8bbf\u95ee\u6570\u636e\u7684\u5b50\u96c6\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.oracle.com/security-alerts/cpuoct2024.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-18133",
"openTime": "2025-08-12",
"patchDescription": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\r\n\r\nOracle MySQL Server\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u8bfb\u53d6\u53ef\u8bbf\u95ee\u6570\u636e\u7684\u5b50\u96c6\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-18133\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Server \u003c=8.4.2",
"Oracle MySQL Server \u003c=9.0.1"
]
},
"referenceLink": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"serverity": "\u4f4e",
"submitTime": "2024-10-23",
"title": "Oracle MySQL Server\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-18133\uff09"
}
FKIE_CVE-2024-21244
Vulnerability from fkie_nvd - Published: 2024-10-15 20:15 - Updated: 2025-11-03 22:16{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5DABE4-1141-43CC-B4CA-7DCE4EEBD4AB",
"versionEndIncluding": "8.4.2",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1DFA06-03A1-41E6-BF09-156C1084A811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9067C169-3091-459A-A8C1-4E79152B18F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Telemetry). Las versiones compatibles afectadas son 8.4.2 y anteriores y 9.0.1 y anteriores. Esta vulnerabilidad, que es dif\u00edcil de explotar, permite que un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometa MySQL Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de MySQL Server. Puntuaci\u00f3n base CVSS 3.1 2.2 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)."
}
],
"id": "CVE-2024-21244",
"lastModified": "2025-11-03T22:16:44.583",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 1.4,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2024-10-15T20:15:14.130",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20241101-0008/"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-36GQ-2499-PQ9X
Vulnerability from github – Published: 2024-10-15 21:30 – Updated: 2025-11-04 00:31Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).
{
"affected": [],
"aliases": [
"CVE-2024-21244"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-10-15T20:15:14Z",
"severity": "LOW"
},
"details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Telemetry). Supported versions that are affected are 8.4.2 and prior and 9.0.1 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 2.2 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N).",
"id": "GHSA-36gq-2499-pq9x",
"modified": "2025-11-04T00:31:35Z",
"published": "2024-10-15T21:30:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21244"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241101-0008"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2024-21244
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2024-21244",
"id": "GSD-2024-21244"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-21244"
],
"id": "GSD-2024-21244",
"modified": "2023-12-13T01:21:42.767867Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-21244",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
NCSC-2024-0420
Vulnerability from csaf_ncscnl - Published: 2024-10-17 13:20 - Updated: 2024-10-17 13:20| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_enterprise_backup
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_enterprise_backup
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_client
oracle
|
cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*
|
— | |
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_client
oracle
|
cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*
|
— | |
|
mysql
oracle
|
cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
mysql_cluster
oracle
|
cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*
|
— | |
|
mysql_connectors
oracle
|
cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*
|
— | |
|
mysql_enterprise_monitor
oracle
|
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
— | |
|
mysql_server
oracle
|
cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*
|
— | |
|
mysql_workbench
oracle
|
cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*
|
— |
| URL | Category |
|---|---|
| https://www.oracle.com/security-alerts/cpuoct2024.html | external |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2023… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
| https://api.ncsc.nl/velma/v1/vulnerabilities/2024… | self |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in MySQL.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of om toegang te krijgen tot gevoelige gegevens in de database en deze mogelijk te manipuleren.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle MySQL",
"tracking": {
"current_release_date": "2024-10-17T13:20:42.437738Z",
"id": "NCSC-2024-0420",
"initial_release_date": "2024-10-17T13:20:42.437738Z",
"revision_history": [
{
"date": "2024-10-17T13:20:42.437738Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "mysql_cluster",
"product": {
"name": "mysql_cluster",
"product_id": "CSAFPID-764289",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_connectors",
"product": {
"name": "mysql_connectors",
"product_id": "CSAFPID-221160",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_connectors:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql",
"product": {
"name": "mysql",
"product_id": "CSAFPID-249429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_backup",
"product": {
"name": "mysql_enterprise_backup",
"product_id": "CSAFPID-1673522",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_backup:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_enterprise_monitor",
"product": {
"name": "mysql_enterprise_monitor",
"product_id": "CSAFPID-764290",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_server",
"product": {
"name": "mysql_server",
"product_id": "CSAFPID-504250",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_workbench",
"product": {
"name": "mysql_workbench",
"product_id": "CSAFPID-764763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_workbench:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "mysql_client",
"product": {
"name": "mysql_client",
"product_id": "CSAFPID-1673440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:mysql_client:9.0.1_and_prior:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45853",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45853",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45853.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2023-45853"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673522"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7264",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673522"
]
}
],
"title": "CVE-2024-7264"
},
{
"cve": "CVE-2024-21193",
"references": [
{
"category": "self",
"summary": "CVE-2024-21193",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21193.json"
}
],
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"references": [
{
"category": "self",
"summary": "CVE-2024-21194",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21194.json"
}
],
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21196",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21196.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21197",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21197.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21198",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21198.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21199",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21199.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21200",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21201",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21201.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21203",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21203.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"references": [
{
"category": "self",
"summary": "CVE-2024-21204",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21204.json"
}
],
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21207",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21207.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21209",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21209.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.0,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21212.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21213",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21213.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21231.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21238.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21239",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21239.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21241",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21241.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"product_status": {
"known_affected": [
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21244.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"product_status": {
"known_affected": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21247",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21247.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673440",
"CSAFPID-249429"
]
}
],
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"references": [
{
"category": "self",
"summary": "CVE-2024-21262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21262.json"
}
],
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"references": [
{
"category": "self",
"summary": "CVE-2024-21272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21272.json"
}
],
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764289",
"CSAFPID-221160",
"CSAFPID-764290",
"CSAFPID-504250",
"CSAFPID-764763"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-39689",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-39689",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
}
],
"title": "CVE-2024-39689"
}
]
}
WID-SEC-W-2024-3188
Vulnerability from csaf_certbund - Published: 2024-10-15 22:00 - Updated: 2025-06-10 22:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
NetApp ActiveIQ Unified Manager for VMware vSphere
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere
|
for VMware vSphere | |
|
NetApp ActiveIQ Unified Manager
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
NetApp ActiveIQ Unified Manager for Microsoft Windows
NetApp / ActiveIQ Unified Manager
|
cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows
|
for Microsoft Windows | |
|
SUSE openSUSE
SUSE
|
cpe:/o:suse:opensuse:-
|
— | |
|
Oracle MySQL 8.4.0
Oracle / MySQL
|
cpe:/a:oracle:mysql:8.4.0
|
8.4.0 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— | |
|
IBM Security Guardium 11.5
IBM / Security Guardium
|
cpe:/a:ibm:security_guardium:11.5
|
11.5 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.1
Oracle / MySQL
|
<=8.4.1 | ||
|
Oracle MySQL <=9.0.1
Oracle / MySQL
|
<=9.0.1 | ||
|
Oracle MySQL <=7.5.35
Oracle / MySQL
|
<=7.5.35 | ||
|
Oracle MySQL <=7.6.31
Oracle / MySQL
|
<=7.6.31 | ||
|
Oracle MySQL <=8.0.35
Oracle / MySQL
|
<=8.0.35 | ||
|
Oracle MySQL <=8.0.39
Oracle / MySQL
|
<=8.0.39 | ||
|
Oracle MySQL <=8.4.2
Oracle / MySQL
|
<=8.4.2 | ||
|
Oracle MySQL <=9.0.0
Oracle / MySQL
|
<=9.0.0 | ||
|
Oracle MySQL <=8.0.38
Oracle / MySQL
|
<=8.0.38 |
| URL | Category |
|---|---|
| https://wid.cert-bund.de/.well-known/csaf/white/2… | self |
| https://wid.cert-bund.de/portal/wid/securityadvis… | self |
| https://www.oracle.com/security-alerts/cpuoct2024… | external |
| https://security.netapp.com/advisory/ntap-2024102… | external |
| https://lists.opensuse.org/archives/list/security… | external |
| https://ubuntu.com/security/notices/USN-7102-1 | external |
| https://access.redhat.com/errata/RHSA-2025:1671 | external |
| https://access.redhat.com/errata/RHSA-2025:1673 | external |
| https://linux.oracle.com/errata/ELSA-2025-1673.html | external |
| https://linux.oracle.com/errata/ELSA-2025-1671.html | external |
| https://errata.build.resf.org/RLSA-2025:1673 | external |
| https://www.ibm.com/support/pages/node/7233600 | external |
| https://security.netapp.com/advisory/NTAP-20241101-0006 | external |
| https://security.netapp.com/advisory/NTAP-20241101-0009 | external |
| https://security.netapp.com/advisory/NTAP-20241101-0007 | external |
| https://security.netapp.com/advisory/NTAP-20241101-0005 | external |
| https://security.netapp.com/advisory/NTAP-20241025-0009 | external |
| https://security.netapp.com/advisory/NTAP-20241025-0008 | external |
| https://security.netapp.com/advisory/NTAP-20241025-0007 | external |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3188 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3188.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3188 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3188"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle MySQL vom 2024-10-15",
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixMSQL"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0006 vom 2024-10-25",
"url": "https://security.netapp.com/advisory/ntap-20241025-0006/"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2024:0351-1 vom 2024-11-07",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A4QYWY7IAP4RFAA3R6QMK3Q6FFAY4UOZ/"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7102-1 vom 2024-11-12",
"url": "https://ubuntu.com/security/notices/USN-7102-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1671 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1671"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1673 vom 2025-02-19",
"url": "https://access.redhat.com/errata/RHSA-2025:1673"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1673 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1673.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-1671 vom 2025-02-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-1671.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:1673 vom 2025-02-26",
"url": "https://errata.build.resf.org/RLSA-2025:1673"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7233600 vom 2025-05-15",
"url": "https://www.ibm.com/support/pages/node/7233600"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0006 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0006"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0009 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0009"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0007 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0007"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241101-0005 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241101-0005"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0009 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0009"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0008 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0008"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20241025-0007 vom 2025-06-11",
"url": "https://security.netapp.com/advisory/NTAP-20241025-0007"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-06-10T22:00:00.000+00:00",
"generator": {
"date": "2025-06-11T06:26:42.340+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-3188",
"initial_release_date": "2024-10-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-27T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2024-11-12T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-26T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-05-15T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-10T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von NetApp aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "11.5",
"product": {
"name": "IBM Security Guardium 11.5",
"product_id": "1411051",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:security_guardium:11.5"
}
}
}
],
"category": "product_name",
"name": "Security Guardium"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
},
{
"category": "product_version",
"name": "for Microsoft Windows",
"product": {
"name": "NetApp ActiveIQ Unified Manager for Microsoft Windows",
"product_id": "T025631",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_microsoft_windows"
}
}
},
{
"category": "product_name",
"name": "NetApp ActiveIQ Unified Manager",
"product": {
"name": "NetApp ActiveIQ Unified Manager",
"product_id": "T034126",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:-"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.35",
"product": {
"name": "Oracle MySQL \u003c=8.0.35",
"product_id": "1566667-fixed"
}
},
{
"category": "product_version",
"name": "8.4.0",
"product": {
"name": "Oracle MySQL 8.4.0",
"product_id": "T036237",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:mysql:8.4.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.1",
"product": {
"name": "Oracle MySQL \u003c=8.4.1",
"product_id": "T036240-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.0",
"product": {
"name": "Oracle MySQL \u003c=9.0.0",
"product_id": "T036241-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.38",
"product": {
"name": "Oracle MySQL \u003c=8.0.38",
"product_id": "T036275-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.39",
"product": {
"name": "Oracle MySQL \u003c=8.0.39",
"product_id": "T038403-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.2",
"product": {
"name": "Oracle MySQL \u003c=8.4.2",
"product_id": "T038404-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.1",
"product": {
"name": "Oracle MySQL \u003c=9.0.1",
"product_id": "T038405-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.5.35",
"product": {
"name": "Oracle MySQL \u003c=7.5.35",
"product_id": "T038406-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.31",
"product": {
"name": "Oracle MySQL \u003c=7.6.31",
"product_id": "T038407-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21193",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21193"
},
{
"cve": "CVE-2024-21194",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21194"
},
{
"cve": "CVE-2024-21196",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21196"
},
{
"cve": "CVE-2024-21197",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21197"
},
{
"cve": "CVE-2024-21198",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21198"
},
{
"cve": "CVE-2024-21199",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21199"
},
{
"cve": "CVE-2024-21200",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21200"
},
{
"cve": "CVE-2024-21201",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21201"
},
{
"cve": "CVE-2024-21203",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21203"
},
{
"cve": "CVE-2024-21204",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21204"
},
{
"cve": "CVE-2024-21207",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21207"
},
{
"cve": "CVE-2024-21209",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21209"
},
{
"cve": "CVE-2024-21212",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21212"
},
{
"cve": "CVE-2024-21213",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21213"
},
{
"cve": "CVE-2024-21218",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21218"
},
{
"cve": "CVE-2024-21219",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21219"
},
{
"cve": "CVE-2024-21230",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21230"
},
{
"cve": "CVE-2024-21231",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21231"
},
{
"cve": "CVE-2024-21232",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21232"
},
{
"cve": "CVE-2024-21236",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21236"
},
{
"cve": "CVE-2024-21237",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21237"
},
{
"cve": "CVE-2024-21238",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21238"
},
{
"cve": "CVE-2024-21239",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21239"
},
{
"cve": "CVE-2024-21241",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21241"
},
{
"cve": "CVE-2024-21243",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21243"
},
{
"cve": "CVE-2024-21244",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21244"
},
{
"cve": "CVE-2024-21247",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21247"
},
{
"cve": "CVE-2024-21262",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21262"
},
{
"cve": "CVE-2024-21272",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-21272"
},
{
"cve": "CVE-2024-28182",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-5535",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7264",
"product_status": {
"known_affected": [
"T025152",
"T034126",
"67646",
"T000126",
"T025631",
"T027843",
"T036237",
"T004914",
"T032255",
"1411051"
],
"last_affected": [
"T036240",
"T038405",
"T038406",
"T038407",
"1566667",
"T038403",
"T038404",
"T036241",
"T036275"
]
},
"release_date": "2024-10-15T22:00:00.000+00:00",
"title": "CVE-2024-7264"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.