Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-50095 (GCVE-0-2025-50095)
Vulnerability from cvelistv5 – Published: 2025-07-15 19:27 – Updated: 2025-07-16 13:47- Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
| URL | Tags |
|---|---|
| https://www.oracle.com/security-alerts/cpujul2025.html | vendor-advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| Oracle Corporation | MySQL Server |
Affected:
9.0.0 , ≤ 9.3.0
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-50095",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-16T13:45:04.732167Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-16T13:47:11.211Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "MySQL Server",
"vendor": "Oracle Corporation",
"versions": [
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.0.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.3.0",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en-US",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.",
"lang": "en-US"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-15T19:27:47.369Z",
"orgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"shortName": "oracle"
},
"references": [
{
"name": "Oracle Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85",
"assignerShortName": "oracle",
"cveId": "CVE-2025-50095",
"datePublished": "2025-07-15T19:27:47.369Z",
"dateReserved": "2025-06-11T22:56:56.112Z",
"dateUpdated": "2025-07-16T13:47:11.211Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-50095",
"date": "2026-05-21",
"epss": "0.00396",
"percentile": "0.60607"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-50095\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2025-07-15T20:15:45.657\",\"lastModified\":\"2025-07-16T19:51:49.903\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles afectadas son 9.0.0-9.3.0. Esta vulnerabilidad, f\u00e1cilmente explotable, permite a un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometer MySQL Server. Los ataques exitosos a esta vulnerabilidad pueden provocar un bloqueo o un fallo repetitivo (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4.9 (Afecta a la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert_us@oracle.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":4.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0.0\",\"versionEndIncluding\":\"9.3.0\",\"matchCriteriaId\":\"7DD3ED8B-5060-4228-A4F7-F01C090D034B\"}]}]}],\"references\":[{\"url\":\"https://www.oracle.com/security-alerts/cpujul2025.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-50095\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-07-16T13:45:04.732167Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-07-16T13:45:08.609Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Oracle Corporation\", \"product\": \"MySQL Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0.0\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"9.3.0\"}]}], \"references\": [{\"url\": \"https://www.oracle.com/security-alerts/cpujul2025.html\", \"name\": \"Oracle Advisory\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"description\": \"Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndIncluding\": \"9.3.0\", \"versionStartIncluding\": \"9.0.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"shortName\": \"oracle\", \"dateUpdated\": \"2025-07-15T19:27:47.369Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-50095\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-16T13:47:11.211Z\", \"dateReserved\": \"2025-06-11T22:56:56.112Z\", \"assignerOrgId\": \"43595867-4340-4103-b7a2-9a5208d29a85\", \"datePublished\": \"2025-07-15T19:27:47.369Z\", \"assignerShortName\": \"oracle\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0601
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Cluster versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Client versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.34 | ||
| Oracle | MySQL | MySQL Cluster versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.42 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50089"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53032"
},
{
"name": "CVE-2025-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50076"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50095"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50068"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50081"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50103"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0601",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujul2025",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
CERTFR-2025-AVI-0601
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Cluster versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Client versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Client versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server versions 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.34 | ||
| Oracle | MySQL | MySQL Cluster versions 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.42 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Client versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server versions 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.34",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-50089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50089"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2025-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53032"
},
{
"name": "CVE-2025-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50076"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2025-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50095"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2025-50068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50068"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2025-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50081"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-50103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50103"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0601",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujul2025",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
]
}
BDU:2025-08677
Vulnerability from fstec - Published: 15.07.2025{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 9.0.0 \u0434\u043e 9.3.0 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Server)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://www.oracle.com/security-alerts/cpujul2025.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.07.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.07.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-08677",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-50095",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "MySQL Server",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: Optimizer \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 Server: Optimizer \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0430\u0437\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 MySQL Server \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u0440\u0430\u0441\u0445\u043e\u0434\u043e\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.oracle.com/security-alerts/cpujul2025.html",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0423\u0411\u0414",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)"
}
CNVD-2025-17361
Vulnerability from cnvd - Published: 2025-08-01厂商已发布了漏洞修复程序,请及时关注更新: https://www.oracle.com/security-alerts/cpujul2025.html
| Name | Oracle MySQL Server >=9.0.0,<=9.3.0 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2025-50095",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2025-50095"
}
},
"description": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\n\nOracle MySQL Server\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eOptimizer\u7ec4\u4ef6\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.oracle.com/security-alerts/cpujul2025.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2025-17361",
"openTime": "2025-08-01",
"patchDescription": "Oracle MySQL Server\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u6b3e\u5173\u7cfb\u578b\u6570\u636e\u5e93\u3002\r\n\r\nOracle MySQL Server\u5b58\u5728\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eOptimizer\u7ec4\u4ef6\u8bbf\u95ee\u63a7\u5236\u4e0d\u5f53\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Oracle MySQL Server\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2025-17361\uff09\u7684\u8865\u4e01",
"products": {
"product": "Oracle MySQL Server \u003e=9.0.0\uff0c\u003c=9.3.0"
},
"referenceLink": "https://www.oracle.com/security-alerts/cpujul2025.html",
"serverity": "\u4e2d",
"submitTime": "2025-07-21",
"title": "Oracle MySQL Server\u8d44\u6e90\u7ba1\u7406\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2025-17361\uff09"
}
FKIE_CVE-2025-50095
Vulnerability from fkie_nvd - Published: 2025-07-15 20:15 - Updated: 2025-07-16 19:51| URL | Tags | ||
|---|---|---|---|
| secalert_us@oracle.com | https://www.oracle.com/security-alerts/cpujul2025.html | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7DD3ED8B-5060-4228-A4F7-F01C090D034B",
"versionEndIncluding": "9.3.0",
"versionStartIncluding": "9.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
},
{
"lang": "es",
"value": "Vulnerabilidad en el producto MySQL Server de Oracle MySQL (componente: Server: Optimizer). Las versiones compatibles afectadas son 9.0.0-9.3.0. Esta vulnerabilidad, f\u00e1cilmente explotable, permite a un atacante con privilegios elevados y acceso a la red a trav\u00e9s de m\u00faltiples protocolos comprometer MySQL Server. Los ataques exitosos a esta vulnerabilidad pueden provocar un bloqueo o un fallo repetitivo (DOS completo) de MySQL Server. Puntuaci\u00f3n base de CVSS 3.1: 4.9 (Afecta a la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H)."
}
],
"id": "CVE-2025-50095",
"lastModified": "2025-07-16T19:51:49.903",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "secalert_us@oracle.com",
"type": "Secondary"
}
]
},
"published": "2025-07-15T20:15:45.657",
"references": [
{
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
],
"sourceIdentifier": "secalert_us@oracle.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-9X98-6MJR-3CHW
Vulnerability from github – Published: 2025-07-15 21:31 – Updated: 2025-07-15 21:31Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
{
"affected": [],
"aliases": [
"CVE-2025-50095"
],
"database_specific": {
"cwe_ids": [
"CWE-400"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-07-15T20:15:45Z",
"severity": "MODERATE"
},
"details": "Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 9.0.0-9.3.0. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).",
"id": "GHSA-9x98-6mjr-3chw",
"modified": "2025-07-15T21:31:42Z",
"published": "2025-07-15T21:31:42Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-50095"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
WID-SEC-W-2025-1567
Vulnerability from csaf_certbund - Published: 2025-07-15 22:00 - Updated: 2025-11-17 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Xerox FreeFlow Print Server v7
Xerox / FreeFlow Print Server
|
cpe:/a:xerox:freeflow_print_server:v7
|
v7 | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
RESF Rocky Linux
RESF
|
cpe:/o:resf:rocky_linux:-
|
— |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Oracle MySQL <=8.4.5
Oracle / MySQL
|
<=8.4.5 | ||
|
Oracle MySQL <=8.0.41
Oracle / MySQL
|
<=8.0.41 | ||
|
Oracle MySQL <=8.0.42
Oracle / MySQL
|
<=8.0.42 | ||
|
Oracle MySQL <=8.0.25
Oracle / MySQL
|
<=8.0.25 | ||
|
Oracle MySQL <=9.2.0
Oracle / MySQL
|
<=9.2.0 | ||
|
Oracle MySQL <=7.6.34
Oracle / MySQL
|
<=7.6.34 | ||
|
Oracle MySQL <=9.3.0
Oracle / MySQL
|
<=9.3.0 | ||
|
Oracle MySQL <=9.1.0
Oracle / MySQL
|
<=9.1.0 | ||
|
Oracle MySQL <=8.4.4
Oracle / MySQL
|
<=8.4.4 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "MySQL ist ein Open Source Datenbankserver von Oracle.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle MySQL ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1567 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1567.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1567 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1567"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - July 2025 - Appendix Oracle MySQL vom 2025-07-15",
"url": "https://www.oracle.com/security-alerts/cpujul2025.html#AppendixMSQL"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7691-1 vom 2025-08-13",
"url": "https://ubuntu.com/security/notices/USN-7691-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15699 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15699"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-15699 vom 2025-09-13",
"url": "http://linux.oracle.com/errata/ELSA-2025-15699.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16046 vom 2025-09-17",
"url": "https://access.redhat.com/errata/RHSA-2025:16046"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16086 vom 2025-09-17",
"url": "https://access.redhat.com/errata/RHSA-2025:16086"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16046 vom 2025-09-18",
"url": "https://linux.oracle.com/errata/ELSA-2025-16046.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16086 vom 2025-09-23",
"url": "https://linux.oracle.com/errata/ELSA-2025-16086.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:16861 vom 2025-09-29",
"url": "https://access.redhat.com/errata/RHSA-2025:16861"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-16861 vom 2025-09-30",
"url": "https://linux.oracle.com/errata/ELSA-2025-16861.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7691-2 vom 2025-10-06",
"url": "https://ubuntu.com/security/notices/USN-7691-2"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:16086 vom 2025-10-10",
"url": "https://errata.build.resf.org/RLSA-2025:16086"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX25-018 vom 2025-11-18",
"url": "https://security.business.xerox.com/wp-content/uploads/2025/11/Xerox-Security-Bulletin-XRX25-018-Xerox-FreeFlow-Print-Server-v7.pdf"
}
],
"source_lang": "en-US",
"title": "Oracle MySQL: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-11-17T23:00:00.000+00:00",
"generator": {
"date": "2025-11-18T08:12:42.757+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-1567",
"initial_release_date": "2025-07-15T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-16T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-21495, EUVD-2025-21498, EUVD-2025-21496, EUVD-2025-21494"
},
{
"date": "2025-08-13T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-14T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-23T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-28T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-29T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-10-06T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-10-09T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2025-11-17T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von XEROX aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=8.0.25",
"product": {
"name": "Oracle MySQL \u003c=8.0.25",
"product_id": "858557"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.25",
"product": {
"name": "Oracle MySQL \u003c=8.0.25",
"product_id": "858557-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.0",
"product": {
"name": "Oracle MySQL \u003c=9.1.0",
"product_id": "T040478"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.0",
"product": {
"name": "Oracle MySQL \u003c=9.1.0",
"product_id": "T040478-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.41",
"product": {
"name": "Oracle MySQL \u003c=8.0.41",
"product_id": "T042823"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.41",
"product": {
"name": "Oracle MySQL \u003c=8.0.41",
"product_id": "T042823-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.2.0",
"product": {
"name": "Oracle MySQL \u003c=9.2.0",
"product_id": "T042824"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.2.0",
"product": {
"name": "Oracle MySQL \u003c=9.2.0",
"product_id": "T042824-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.4",
"product": {
"name": "Oracle MySQL \u003c=8.4.4",
"product_id": "T042826"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.4",
"product": {
"name": "Oracle MySQL \u003c=8.4.4",
"product_id": "T042826-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.42",
"product": {
"name": "Oracle MySQL \u003c=8.0.42",
"product_id": "T045391"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.0.42",
"product": {
"name": "Oracle MySQL \u003c=8.0.42",
"product_id": "T045391-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.5",
"product": {
"name": "Oracle MySQL \u003c=8.4.5",
"product_id": "T045392"
}
},
{
"category": "product_version_range",
"name": "\u003c=8.4.5",
"product": {
"name": "Oracle MySQL \u003c=8.4.5",
"product_id": "T045392-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.3.0",
"product": {
"name": "Oracle MySQL \u003c=9.3.0",
"product_id": "T045393"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.3.0",
"product": {
"name": "Oracle MySQL \u003c=9.3.0",
"product_id": "T045393-fixed"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.34",
"product": {
"name": "Oracle MySQL \u003c=7.6.34",
"product_id": "T045394"
}
},
{
"category": "product_version_range",
"name": "\u003c=7.6.34",
"product": {
"name": "Oracle MySQL \u003c=7.6.34",
"product_id": "T045394-fixed"
}
}
],
"category": "product_name",
"name": "MySQL"
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v7",
"product": {
"name": "Xerox FreeFlow Print Server v7",
"product_id": "T035098",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-9287",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2024-9287"
},
{
"cve": "CVE-2025-0725",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-0725"
},
{
"cve": "CVE-2025-32415",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-50068",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50068"
},
{
"cve": "CVE-2025-50076",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50076"
},
{
"cve": "CVE-2025-50077",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50077"
},
{
"cve": "CVE-2025-50078",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50078"
},
{
"cve": "CVE-2025-50079",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50079"
},
{
"cve": "CVE-2025-50080",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50080"
},
{
"cve": "CVE-2025-50081",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50081"
},
{
"cve": "CVE-2025-50082",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50082"
},
{
"cve": "CVE-2025-50083",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50083"
},
{
"cve": "CVE-2025-50084",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50084"
},
{
"cve": "CVE-2025-50085",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50085"
},
{
"cve": "CVE-2025-50086",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50086"
},
{
"cve": "CVE-2025-50087",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50087"
},
{
"cve": "CVE-2025-50088",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50088"
},
{
"cve": "CVE-2025-50089",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50089"
},
{
"cve": "CVE-2025-50091",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50091"
},
{
"cve": "CVE-2025-50092",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50092"
},
{
"cve": "CVE-2025-50093",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50093"
},
{
"cve": "CVE-2025-50094",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50094"
},
{
"cve": "CVE-2025-50095",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50095"
},
{
"cve": "CVE-2025-50096",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50096"
},
{
"cve": "CVE-2025-50097",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50097"
},
{
"cve": "CVE-2025-50098",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50098"
},
{
"cve": "CVE-2025-50099",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50099"
},
{
"cve": "CVE-2025-50100",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50100"
},
{
"cve": "CVE-2025-50101",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50101"
},
{
"cve": "CVE-2025-50102",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50102"
},
{
"cve": "CVE-2025-50103",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50103"
},
{
"cve": "CVE-2025-50104",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-50104"
},
{
"cve": "CVE-2025-53023",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-53023"
},
{
"cve": "CVE-2025-53032",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-53032"
},
{
"cve": "CVE-2025-5399",
"product_status": {
"known_affected": [
"67646",
"T000126",
"T035098",
"T004914",
"T032255"
],
"last_affected": [
"T045392",
"T042823",
"T045391",
"858557",
"T042824",
"T045394",
"T045393",
"T040478",
"T042826"
]
},
"release_date": "2025-07-15T22:00:00.000+00:00",
"title": "CVE-2025-5399"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.