Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-50068 (GCVE-0-2025-50068)
Vulnerability from cvelistv5 – Published: 2025-07-15 19:27 – Updated: 2026-02-26 17:50- Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster.
| URL | Tags |
|---|---|
| https://www.oracle.com/security-alerts/cpujul2025.html | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Oracle Corporation | MySQL Cluster |
Affected:
8.0.0 , ≤ 8.0.42
(custom)
Affected: 8.4.0 , ≤ 8.4.5 (custom) Affected: 9.0.0 , ≤ 9.3.0 (custom) |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-50068",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-16T03:56:17.440147Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T17:50:36.714Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MySQL Cluster",
"vendor": "Oracle Corporation",
"versions": [
{
"lessThanOrEqual": "8.0.42",
"status": "affected",
"version": "8.0.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "8.4.5",
"status": "affected",
"version": "8.4.0",
"versionType": "custom"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.0.42",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionEndIncluding": "8.4.5",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.3.0",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-15T19:27:37.241Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2025-50068",
"datePublished": "2025-07-15T19:27:37.241Z",
"dateReserved": "2025-06-11T22:56:56.110Z",
"dateUpdated": "2026-02-26T17:50:36.714Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-50068",
"date": "2026-05-20",
"epss": "0.00191",
"percentile": "0.40629"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-50068\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2025-07-15T20:15:41.467\",\"lastModified\":\"2025-07-24T21:27:37.400\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto MySQL Cluster de Oracle MySQL (componente: Cluster: General). Las versiones compatibles afectadas son 8.0.0-8.0.42, 8.4.0-8.4.5 y 9.0.0-9.3.0. Esta vulnerabilidad, f\u00e1cilmente explotable, permite a un atacante con privilegios elevados, con acceso a la infraestructura donde se ejecuta MySQL Cluster, comprometer MySQL Cluster. Los ataques con \u00e9xito pueden resultar en la toma de control de MySQL Cluster. Puntuaci\u00f3n base de CVSS 3.1: 6.7 (impactos en confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0.0\",\"versionEndIncluding\":\"8.0.42\",\"matchCriteriaId\":\"40C3A487-3B18-4183-A19E-78F1CFB25B24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.4.0\",\"versionEndIncluding\":\"8.4.5\",\"matchCriteriaId\":\"AC787E24-61FE-4D25-A870-F27A355866A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndIncluding\":\"9.3.0\",\"matchCriteriaId\":\"06B20562-52B9-4444-8623-E41EFF7C96F3\"}]}]}],\"references\":[{\"url\":\"https://www.oracle.com/security-alerts/cpujul2025.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-50068\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-15T20:39:03.225415Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"description\": \"CWE-noinfo Not enough information\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-15T20:40:50.305Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.7, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Cluster\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.0.42\"}, {\"status\": \"affected\", \"version\": \"8.4.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"8.4.5\"}, {\"status\": \"affected\", \"version\": \"9.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.3.0\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujul2025.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster.\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"8.0.42\", \"versionStartIncluding\": \"8.0.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"8.4.5\", \"versionStartIncluding\": \"8.4.0\"}, {\"criteria\": \"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"9.3.0\", \"versionStartIncluding\": \"9.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2025-07-15T19:27:37.241Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-50068\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-15T20:40:53.382Z\", \"dateReserved\": \"2025-06-11T22:56:56.110Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2025-07-15T19:27:37.241Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0601
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Cluster versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Client versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.34 | ||
| Oracle | MySQL | MySQL Cluster versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.42 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50089"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53032"
},
{
"name": "CVE-2025-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50076"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50095"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50068"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50081"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50103"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0601",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujul2025",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
CERTFR-2025-AVI-0601
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Cluster versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Client versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.34 | ||
| Oracle | MySQL | MySQL Cluster versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.42 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50089"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53032"
},
{
"name": "CVE-2025-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50076"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50095"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50068"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50081"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50103"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0601",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujul2025",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
BDU:2025-08660
Vulnerability from fstec - Published: 15.07.2025{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": "AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear",
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 8.0.0 \u0434\u043e 8.0.42 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Cluster), \u043e\u0442 8.4.0 \u0434\u043e 8.4.5 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Cluster), \u043e\u0442 9.0.0 \u0434\u043e 9.3.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Cluster)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.oracle.com/security-alerts/cpujul2025.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.07.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-08660",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-50068",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "MySQL Cluster",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Cluster: General \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Cluster, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435\u043c",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 (CWE-20)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Cluster: General \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Cluster \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435\u043c",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.oracle.com/security-alerts/cpujul2025.html\nhttps://www.cybersecurity-help.cz/vdb/SB2025071681",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-20",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,7)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,7)"
}
CNVD-2025-17167
Vulnerability from cnvd - Published: 2025-07-30厂商已发布了漏洞修复程序,请及时关注更新: https://www.oracle.com/security-alerts/cpujul2025.html
| Name | ['Oracle MySQL Cluster >=8.0.0,<=8.0.42', 'Oracle MySQL Cluster >=8.4.0,<=8.4.5', 'Oracle MySQL Cluster >=9.0.0,<=9.3.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-50068",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-50068"
}
},
"description": "Oracle MySQL\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002MySQL Client\u662fMySQL\u5ba2\u6237\u7aef\uff0c\u662f\u7528\u4e8e\u4e0e\u670d\u52a1\u5668\u901a\u4fe1\u4ee5\u5904\u7406\u670d\u52a1\u5668\u7ba1\u7406\u7684\u6570\u636e\u5e93\u4e2d\u7684\u4fe1\u606f\u7684\u7a0b\u5e8f\u3002\n\nOracle MySQL\u7684MySQL Cluster 8.0.0\u81f38.0.42\u7248\u672c\u30018.4.0\u81f38.4.5\u7248\u672c\u548c9.0.0\u81f39.3.0\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u88ab\u63a5\u7ba1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.oracle.com/security-alerts/cpujul2025.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-17167",
"openTime": "2025-07-30",
"patchDescription": "Oracle MySQL\u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u5173\u7cfb\u578b\u6570\u636e\u5e93\u7ba1\u7406\u7cfb\u7edf\u3002MySQL Client\u662fMySQL\u5ba2\u6237\u7aef\uff0c\u662f\u7528\u4e8e\u4e0e\u670d\u52a1\u5668\u901a\u4fe1\u4ee5\u5904\u7406\u670d\u52a1\u5668\u7ba1\u7406\u7684\u6570\u636e\u5e93\u4e2d\u7684\u4fe1\u606f\u7684\u7a0b\u5e8f\u3002\r\n\r\nOracle MySQL\u7684MySQL Cluster 8.0.0\u81f38.0.42\u7248\u672c\u30018.4.0\u81f38.4.5\u7248\u672c\u548c9.0.0\u81f39.3.0\u7248\u672c\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u7cfb\u7edf\u88ab\u63a5\u7ba1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-17167\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Oracle MySQL Cluster \u003e=8.0.0\uff0c\u003c=8.0.42",
"Oracle MySQL Cluster \u003e=8.4.0\uff0c\u003c=8.4.5",
"Oracle MySQL Cluster \u003e=9.0.0\uff0c\u003c=9.3.0"
]
},
"referenceLink": "https://www.oracle.com/security-alerts/cpujul2025.html",
"serverity": "\u4e2d",
"submitTime": "2025-07-21",
"title": "Oracle MySQL\u5b58\u5728\u672a\u660e\u6f0f\u6d1e\uff08CNVD-2025-17167\uff09"
}
FKIE_CVE-2025-50068
Vulnerability from fkie_nvd - Published: 2025-07-15 20:15 - Updated: 2025-07-24 21:27| URL | Tags | ||
|---|---|---|---|
| secalert_us@oracle.com | https://www.oracle.com/security-alerts/cpujul2025.html | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| oracle | mysql_cluster | * | |
| oracle | mysql_cluster | * | |
| oracle | mysql_cluster | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40C3A487-3B18-4183-A19E-78F1CFB25B24",
"versionEndIncluding": "8.0.42",
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC787E24-61FE-4D25-A870-F27A355866A4",
"versionEndIncluding": "8.4.5",
"versionStartIncluding": "8.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06B20562-52B9-4444-8623-E41EFF7C96F3",
"versionEndIncluding": "9.3.0",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Cluster de Oracle MySQL (componente: Cluster: General). Las versiones compatibles afectadas son 8.0.0-8.0.42, 8.4.0-8.4.5 y 9.0.0-9.3.0. Esta vulnerabilidad, f\u00e1cilmente explotable, permite a un atacante con privilegios elevados, con acceso a la infraestructura donde se ejecuta MySQL Cluster, comprometer MySQL Cluster. Los ataques con \u00e9xito pueden resultar en la toma de control de MySQL Cluster. Puntuaci\u00f3n base de CVSS 3.1: 6.7 (impactos en confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)."
}
],
"id": "CVE-2025-50068",
"lastModified": "2025-07-24T21:27:37.400",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2025-07-15T20:15:41.467",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-9JHC-WXQ7-43Q6
Vulnerability from github – Published: 2025-07-15 21:31 – Updated: 2025-07-15 21:31Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
{
"affected": [],
"aliases": [
"CVE-2025-50068"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-15T20:15:41Z",
"severity": "MODERATE"
},
"details": "Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 8.0.0-8.0.42, 8.4.0-8.4.5 and 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"id": "GHSA-9jhc-wxq7-43q6",
"modified": "2025-07-15T21:31:40Z",
"published": "2025-07-15T21:31:40Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50068"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-1567
Vulnerability from csaf_certbund - Published: 2025-07-15 22:00 - Updated: 2025-11-17 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1567 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1567.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1567 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1567"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - July 2025 - Appendix Oracle MySQL vom 2025-07-15",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html#AppendixMSQL"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7691-1 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7691-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15699 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15699"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15699 vom 2025-09-13",
"url": "http://linux.oracle.com/errata/ELSA-2025-15699.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16046 vom 2025-09-17",
"url": "https://access.redhat.com/errata/RHSA-2025:16046"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16086 vom 2025-09-17",
"url": "https://access.redhat.com/errata/RHSA-2025:16086"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16046 vom 2025-09-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-16046.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16086 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-16086.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16861 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16861"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16861 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16861.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7691-2 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7691-2"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16086 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:16086"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-17T23:00:00.000+00:00",
"generator": {
"date": "2025-11-18T08:12:42.757+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1567",
"initial_release_date": "2025-07-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-21495, EUVD-2025-21498, EUVD-2025-21496, EUVD-2025-21494"
},
{
"date": "2025-08-13T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.0.25",
"product": {
"name": "Oracle MySQL \u003c=8.0.25",
"product_id": "858557"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.25",
"product": {
"name": "Oracle MySQL \u003c=8.0.25",
"product_id": "858557-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.0",
"product": {
"name": "Oracle MySQL \u003c=9.1.0",
"product_id": "T040478"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.0",
"product": {
"name": "Oracle MySQL \u003c=9.1.0",
"product_id": "T040478-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.41",
"product": {
"name": "Oracle MySQL \u003c=8.0.41",
"product_id": "T042823"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.41",
"product": {
"name": "Oracle MySQL \u003c=8.0.41",
"product_id": "T042823-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.2.0",
"product": {
"name": "Oracle MySQL \u003c=9.2.0",
"product_id": "T042824"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.2.0",
"product": {
"name": "Oracle MySQL \u003c=9.2.0",
"product_id": "T042824-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.4",
"product": {
"name": "Oracle MySQL \u003c=8.4.4",
"product_id": "T042826"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.4",
"product": {
"name": "Oracle MySQL \u003c=8.4.4",
"product_id": "T042826-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.42",
"product": {
"name": "Oracle MySQL \u003c=8.0.42",
"product_id": "T045391"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.42",
"product": {
"name": "Oracle MySQL \u003c=8.0.42",
"product_id": "T045391-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.5",
"product": {
"name": "Oracle MySQL \u003c=8.4.5",
"product_id": "T045392"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.5",
"product": {
"name": "Oracle MySQL \u003c=8.4.5",
"product_id": "T045392-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.3.0",
"product": {
"name": "Oracle MySQL \u003c=9.3.0",
"product_id": "T045393"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.3.0",
"product": {
"name": "Oracle MySQL \u003c=9.3.0",
"product_id": "T045393-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.34",
"product": {
"name": "Oracle MySQL \u003c=7.6.34",
"product_id": "T045394"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.34",
"product": {
"name": "Oracle MySQL \u003c=7.6.34",
"product_id": "T045394-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-9287",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2024-9287"
},
{
"cve": "CVE-2025-0725",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-0725"
},
{
"cve": "CVE-2025-32415",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-50068",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50068"
},
{
"cve": "CVE-2025-50076",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50076"
},
{
"cve": "CVE-2025-50077",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50077"
},
{
"cve": "CVE-2025-50078",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50078"
},
{
"cve": "CVE-2025-50079",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50079"
},
{
"cve": "CVE-2025-50080",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50080"
},
{
"cve": "CVE-2025-50081",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50081"
},
{
"cve": "CVE-2025-50082",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50082"
},
{
"cve": "CVE-2025-50083",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50083"
},
{
"cve": "CVE-2025-50084",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50084"
},
{
"cve": "CVE-2025-50085",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50085"
},
{
"cve": "CVE-2025-50086",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50086"
},
{
"cve": "CVE-2025-50087",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50087"
},
{
"cve": "CVE-2025-50088",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50088"
},
{
"cve": "CVE-2025-50089",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50089"
},
{
"cve": "CVE-2025-50091",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50091"
},
{
"cve": "CVE-2025-50092",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50092"
},
{
"cve": "CVE-2025-50093",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50093"
},
{
"cve": "CVE-2025-50094",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50094"
},
{
"cve": "CVE-2025-50095",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50095"
},
{
"cve": "CVE-2025-50096",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50096"
},
{
"cve": "CVE-2025-50097",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50097"
},
{
"cve": "CVE-2025-50098",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50098"
},
{
"cve": "CVE-2025-50099",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50099"
},
{
"cve": "CVE-2025-50100",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50100"
},
{
"cve": "CVE-2025-50101",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50101"
},
{
"cve": "CVE-2025-50102",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50102"
},
{
"cve": "CVE-2025-50103",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50103"
},
{
"cve": "CVE-2025-50104",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50104"
},
{
"cve": "CVE-2025-53023",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-53023"
},
{
"cve": "CVE-2025-53032",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-53032"
},
{
"cve": "CVE-2025-5399",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-5399"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.